Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: Output format
Post: RE: Output format

yes, the hash file must contain the username. 1st step you crack the hashes by using the --username switch 2nd step you show the hashes with -m x --show --username original_hash_file_with_usernames.t...
philsmd General Talk 1 7,897 11-16-2014, 07:05 PM
    Thread: Help identifying hash type!
Post: RE: Help identifying hash type!

According to the forum rules, which you have accepted, you are not allowed to post hashes. See https://hashcat.net/forum/announcement-2.html Please take a week off and re-read the forum rules. They a...
philsmd General Help 1 4,113 12-11-2014, 12:55 PM
    Thread: Wordlists Contain 0 Bytes?
Post: RE: Wordlists Contain 0 Bytes?

You have specified "-a 3" this means cpu hashcat will use a mask attack (https://hashcat.net/wiki/doku.php?id=mask_attack ). If you instead want to use a wordlist-based attack, you need to specify -a ...
philsmd Old hashcat Support 1 3,909 01-01-2015, 12:02 PM
    Thread: possible bug in ?a on 1.31
Post: RE: possible bug in ?a on 1.31

Maybe you can give the whole command line and tell us some example passwords which should be found. Also, when you specify --increment (or short -i) you should also always specify the --increment-min...
philsmd Old oclHashcat Support 1 3,344 12-17-2014, 01:24 PM
    Thread: Hardware suggest
Post: RE: Hardware suggest

mac/OS X is only supported by cpu hashcat ( https://hashcat.net/hashcat/ ), windows/linux instead are supported by all cats (cpu hashcat, cudaHashcat, oclHashcat). Yes, the GPU may be faster than you...
philsmd Hardware 1 4,722 01-08-2015, 03:26 PM
    Thread: 2 salt problem
Post: RE: 2 salt problem

As far as I've understood your hash type is md5 ($salt1 . $pass . $salt2) I also assume here that you are attacking a single hash only. There are many other attacks that may or may not work faster....
philsmd Old oclHashcat Support 1 3,642 01-14-2015, 03:23 PM
    Thread: Help with output
Post: RE: Help with output

Unfortunately cpu hashcat doesn't support --username together with --show/--left/--remove yet. That means, if you use --username with --remove, the user names won't end up in the new/modified hash li...
philsmd Old hashcat Support 1 4,607 01-20-2015, 08:37 PM
    Thread: input file format
Post: RE: input file format

According to the forum's rules you are not allowed to post hashes! Read the rules here: https://hashcat.net/forum/announcement-2.html I give you 1 week to read them. After the week you might be mo...
philsmd General Help 1 5,098 01-22-2015, 07:16 PM
    Thread: Hired Help?
Post: RE: Hired Help?

Yes, these requests are not allowed here. Furthermore, hashcat is about offline cracking (vs online cracking that you "want"). And of course, the solution for your problem is to not even think abo...
philsmd General Help 1 3,723 01-26-2015, 11:25 AM
    Thread: decryption mechanism in wpa & wpa2
Post: RE: decryption mechanism in wpa & wpa2

the answer is 4. it uses markov chains (so not really random) if you didn't use --markov-disable EDIT: btw this has not specifically to do only with wpa; markov chains are enabled for every hash ty...
philsmd Old oclHashcat Support 1 3,929 01-26-2015, 11:28 AM
    Thread: Dreaded 209 error
Post: RE: Dreaded 209 error

Afaik this error could also occur if you did not extract the oclHashcat .7z archive correctly. You should use something like 7zip on windows and unzip the .7z with this software. After that you ne...
philsmd Old oclHashcat Support 1 3,875 02-18-2015, 12:02 PM
    Thread: How to crack a password in this way with hashcat ?
Post: RE: How to crack a password in this way with hashc...

This trac ticket https://hashcat.net/trac/ticket/539 seems to be related to your question. The main reasons it wasn't implemented yet, was that the full details about the maximum length devs should...
philsmd Old hashcat Support 1 4,407 03-26-2015, 11:50 AM
    Thread: Doesn't create output file
Post: RE: Doesn't create output file

The answer is: this happens because you already did crack this specific hash and it was already in your .pot file (see the warning "INFO: removed 1 hash found in pot file"), hence oclHashcat does not ...
philsmd Old oclHashcat Support 1 4,278 03-27-2015, 05:19 PM
    Thread: Is it a MD5 hash?
Post: RE: Is it a MD5 hash?

1. you should be very careful to post hashes here, because it is not allowed according to the forum rules, see for instance https://hashcat.net/forum/announcement-2.html 2. since you provided the plai...
philsmd General Talk 1 4,620 04-04-2015, 06:49 PM
    Thread: .NET Webapplication
Post: RE: .NET Webapplication

Can't you just replace the "hash" with one you know the password for. I.e. you generate a new "hash" using a simple password and check if you can login etc. What I mean is, in such situations you ...
philsmd General Talk 1 5,173 04-27-2015, 09:49 PM
    Thread: What's wrong? [noob]
Post: RE: What's wrong? [noob]

Code: -- Hash 'hash.hash': Line-length exception -- .... this means that the file hash.hash was not found and oclHashcat did try to load the parameter "hash.hash" as a hash (directly specified ...
philsmd Old oclHashcat Support 1 3,531 06-05-2015, 03:30 AM
    Thread: NTLM v2
Post: RE: NTLM v2

Your forum post is against the rules https://hashcat.net/forum/announcement-2.html "Do not ask people to crack your hash. It does not matter if you are willing to pay."
philsmd Old oclHashcat Support 1 3,629 06-17-2015, 07:53 AM
    Thread: Combine User:hash:salt with Hash:salt:passwords
Post: RE: Combine User:hash:salt with Hash:salt:password...

How to do this was explained dozens of times on the forum and it was even added in the frequently asked question (FAQ) wiki page because of users asking the same question again and again: https://h...
philsmd General Help 1 4,070 07-13-2015, 02:36 PM
    Thread: Regarding to OS X v10.7/8/9
Post: RE: Regarding to OS X v10.7/8/9

for -m 1722: sha512 ($salt.$pass) for -m 7100: PBKDF2-HMAC-SHA512 you can find this information all around the web. It is not a secret.
philsmd General Help 1 3,510 10-22-2015, 12:29 PM
    Thread: input file format
Post: RE: input file format

You can find the hash format for all the supported hash types here: https://hashcat.net/wiki/doku.php?id=example_hashes
philsmd Old hashcat Support 1 13,283 11-05-2015, 10:27 AM