Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: how to take hash with winrar?
Post: RE: how to take hash with winrar?

For -m 12500 = RAR3-hp the hashes must start with $RAR3$*0* if you have a $RAR3$*1* hash (i.e. a rar file without encrypted file names) instead, it is not supported, see https://github.com/hashcat...
philsmd hashcat 8 11,898 08-06-2018, 05:51 PM
    Thread: Is this WPA password cracked?
Post: RE: Is this WPA password cracked?

that's not 100% correct, Mem5 Exhausted could happen if only some of the handshakes are cracked and not all of them. but if all "hashes" are cracked, the status will be "Cracked". The problem w...
philsmd hashcat 8 4,181 01-05-2019, 02:30 PM
    Thread: Help with policygen/maskprocessor to create hcmask
Post: RE: Help with policygen/maskprocessor to create hc...

I literally just wrote what you should do for point #3 use maskprocessor with -q 2 as explained in my command above.
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 8 5,806 01-26-2019, 04:11 PM
    Thread: Help with policygen/maskprocessor to create hcmask
Post: RE: Help with policygen/maskprocessor to create hc...

maskprocessor has an option for #3, see mp64 --help output: Code: -- -q, --seq-max=NUM Maximum number of multiple sequential characters -- for #2 instead you need to generate some k...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 8 5,806 01-26-2019, 12:44 PM
    Thread: Help with policygen/maskprocessor to create hcmask
Post: RE: Help with policygen/maskprocessor to create hc...

the hashcat forum software (CMS) uses mybb. The mybb community/devs implemented the password reset mechanism with a temporary password. It's not your original password. The original password is stored...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 8 5,806 01-26-2019, 11:03 PM
    Thread: I lost my second password blockchain.com.
Post: RE: I lost my second password blockchain.com.

I close this thread because it's getting ridiculous. private mail addresses and advertisement of scammy (sounding) cryptocurrency wallet recovery services. This is not a forum where you post ads like...
philsmd hashcat 8 4,091 02-28-2019, 04:27 PM
    Thread: I lost my second password blockchain.com.
Post: RE: I lost my second password blockchain.com.

Well, as you should already know by registering to this forum, it is not allowed to post hashes (https://hashcat.net/forum/announcement-2.html). It's a reason to ban you. In this case it's even worse ...
philsmd hashcat 8 4,091 02-23-2019, 10:51 AM
    Thread: iTunes backup crack too slow
Post: RE: iTunes backup crack too slow

in this case it depends heavily on the iteration count. this information is stored/present within the hash itself. the hash used within the benchmark uses 10000 iterations (iter) and 1000 iteration...
philsmd hashcat 8 3,798 03-12-2019, 12:01 PM
    Thread: iTunes backup crack too slow
Post: RE: iTunes backup crack too slow

that's interesting. I'm not sure if we should change it though. One problem of changing a benchmark setting is always that users start comparing apple to oranges after the change (and they say "hey...
philsmd hashcat 8 3,798 03-13-2019, 09:47 AM
    Thread: Diskcryptor password
Post: RE: Diskcryptor password

well, we had a similar request from here: https://hashcat.net/forum/thread-8012.html and I tried to patch hashcat v5.1.0 (with commit: 1493bc01cfbf3fe0b7f4f639e43813f590439a4d) a little bit to sup...
philsmd hashcat 8 4,266 03-24-2019, 07:42 PM
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA1 How to get digest value in `Byte` format?

I think it makes sense to explain the problem with some exampes too. just an example, maybe not applicable to your problem at all: "I want to convert 0x01020304 to 0x04030201" "I want to conver...
philsmd hashcat 8 3,509 03-30-2019, 10:00 AM
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...

the u32 and u8 are primitive types, you can simply cast an array of 4-byte integers to an array with 1-byte chars/bytes. Code: -- u8 * bytes = (u8 *) digest32; -- or copy them directly C...
philsmd hashcat 8 3,509 03-30-2019, 11:50 AM
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...

The length of a normal sha256 hash is 64 hexadecimal characters and therefore 32 raw bytes. You are trying to use 4 ints of 4 bytes = 4 * 4 = 16 bytes. That's only half the bytes of the full hash.
philsmd hashcat 8 3,509 03-31-2019, 07:31 PM
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...

no, it's 8 ints (all of which are 4 bytes), see https://github.com/hashcat/hashcat/blob/319bf80178e946f3b833aea3daefe3ddbfde51c2/OpenCL/inc_hash_sha256.h#L64
philsmd hashcat 8 3,509 04-01-2019, 08:35 AM
    Thread: Diskcryptor password
Post: RE: Diskcryptor password

The first step, i.e. implementing the basic DiskCryptor AES module + kernel + test was successfully done: see https://github.com/hashcat/hashcat/commit/60c255a69dd007c02c6514496fe99fce891dae22 and htt...
philsmd hashcat 8 4,266 04-07-2019, 08:37 PM
    Thread: Diskcryptor password
Post: RE: Diskcryptor password

with our latest commit https://github.com/hashcat/hashcat/commit/8f62085ea49d19a2f0e0bebf1ee5ad27f4e51210 we added the support for all the 7 combinations of aes/twofish/serpent (3 pure, 3 with 2 algos...
philsmd hashcat 8 4,266 04-08-2019, 07:49 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

see: https://hashcat.net/forum/thread-6638.html https://hashcat.net/forum/thread-2563-post-15255.html#pid15255
philsmd hashcat 8 3,607 04-18-2019, 02:43 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

the domain is actually not used in computing the response and therefore can be skipped/ignored/anything, but the client challenge must be specified (e.g. 338d08f8e26de933000000000000000000000000000000...
philsmd hashcat 8 3,607 04-18-2019, 08:26 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

maybe you just didn't understand the posts. depending on the output you get from your capture tool/dump (i.e. if it is NetNTLMv1 / NetNTLMv1+ESS or NetNTLMv2), you need to use -m 5500 or -m 5600. ...
philsmd hashcat 8 3,607 04-18-2019, 07:27 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

I guess this is just because you didn't test with the correct password candidate. hashcat only tries the passwords that you tell it to run. Maybe this specific hash is harder to crack and you need...
philsmd hashcat 8 3,607 04-19-2019, 11:44 AM