Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA1 How to get digest value in `Byte` format?

I think it makes sense to explain the problem with some exampes too. just an example, maybe not applicable to your problem at all: "I want to convert 0x01020304 to 0x04030201" "I want to conver...
philsmd hashcat 8 3,509 03-30-2019, 10:00 AM
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...

the u32 and u8 are primitive types, you can simply cast an array of 4-byte integers to an array with 1-byte chars/bytes. Code: -- u8 * bytes = (u8 *) digest32; -- or copy them directly C...
philsmd hashcat 8 3,509 03-30-2019, 11:50 AM
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...

The length of a normal sha256 hash is 64 hexadecimal characters and therefore 32 raw bytes. You are trying to use 4 ints of 4 bytes = 4 * 4 = 16 bytes. That's only half the bytes of the full hash.
philsmd hashcat 8 3,509 03-31-2019, 07:31 PM
    Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...

no, it's 8 ints (all of which are 4 bytes), see https://github.com/hashcat/hashcat/blob/319bf80178e946f3b833aea3daefe3ddbfde51c2/OpenCL/inc_hash_sha256.h#L64
philsmd hashcat 8 3,509 04-01-2019, 08:35 AM
    Thread: Diskcryptor password
Post: RE: Diskcryptor password

The first step, i.e. implementing the basic DiskCryptor AES module + kernel + test was successfully done: see https://github.com/hashcat/hashcat/commit/60c255a69dd007c02c6514496fe99fce891dae22 and htt...
philsmd hashcat 8 4,266 04-07-2019, 08:37 PM
    Thread: Diskcryptor password
Post: RE: Diskcryptor password

with our latest commit https://github.com/hashcat/hashcat/commit/8f62085ea49d19a2f0e0bebf1ee5ad27f4e51210 we added the support for all the 7 combinations of aes/twofish/serpent (3 pure, 3 with 2 algos...
philsmd hashcat 8 4,266 04-08-2019, 07:49 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

see: https://hashcat.net/forum/thread-6638.html https://hashcat.net/forum/thread-2563-post-15255.html#pid15255
philsmd hashcat 8 3,607 04-18-2019, 02:43 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

the domain is actually not used in computing the response and therefore can be skipped/ignored/anything, but the client challenge must be specified (e.g. 338d08f8e26de933000000000000000000000000000000...
philsmd hashcat 8 3,607 04-18-2019, 08:26 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

maybe you just didn't understand the posts. depending on the output you get from your capture tool/dump (i.e. if it is NetNTLMv1 / NetNTLMv1+ESS or NetNTLMv2), you need to use -m 5500 or -m 5600. ...
philsmd hashcat 8 3,607 04-18-2019, 07:27 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

I guess this is just because you didn't test with the correct password candidate. hashcat only tries the passwords that you tell it to run. Maybe this specific hash is harder to crack and you need...
philsmd hashcat 8 3,607 04-19-2019, 11:44 AM
    Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes

yeah, it's very likely that you messed something up in converting (base64 to hex) or truncating the entropy part. I would suggest that you also try with the example hash from https://hashcat.net/wi...
philsmd General Talk 8 3,915 05-29-2019, 09:38 AM
    Thread: Ryzen 5 2400G: Difference between Linux and Windows wrt -m 1800: Factor 3.5
Post: RE: Difference between Linux and Windows wrt -m 18...

the operating system ideally makes no difference (except if you did some specific tuning with one benchmark and didn't with another). I would suggest to test at least the same versions to make a 1:1 c...
philsmd hashcat 8 3,117 05-31-2019, 02:40 PM
    Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes

sorry to hear about your loss. I think something like this explains the format pretty well: https://apple.stackexchange.com/questions/220729/what-type-of-hash-are-a-macs-password-stored-in/220863#2...
philsmd General Talk 8 3,915 05-22-2019, 08:11 AM
    Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes

yeah, never ignore self-test errors. They are warning you that there is something wrong. You could also test beta from https://hashcat.net/beta/ or release versions (even try with older ones) from ...
philsmd General Talk 8 3,915 05-31-2019, 07:35 PM
    Thread: Custom charsets for Cyrillic passwords in NTLM hashes
Post: RE: Custom charsets for Cyrillic passwords in NTLM...

just sort and unique it Code: -- echo -n хер | iconv -f utf8 -t utf16le | xxd -p -c 1 | sort -un | tr -d '\n' --
philsmd hashcat 8 2,730 06-13-2019, 10:49 PM
    Thread: Custom charsets for Cyrillic passwords in NTLM hashes
Post: RE: Custom charsets for Cyrillic passwords in NTLM...

this discussion is very difficult to follow. are you using 2 forum accounts or why are you BotPass answering like it was an answer to you (but actually given to boreas). How are you related if I may a...
philsmd hashcat 8 2,730 06-14-2019, 09:42 PM
    Thread: Custom charsets for Cyrillic passwords in NTLM hashes
Post: RE: Custom charsets for Cyrillic passwords in NTLM...

no, it's perfectly fine to answer like you did and clarify the situation. Thanks for the clarification ! It just wasn't very clear (maybe only to me) that this was just a general clarification/s...
philsmd hashcat 8 2,730 06-15-2019, 07:42 AM
    Thread: Can I configure HC with known chars in a password?
Post: RE: Can I configure HC with known chars in a passw...

see https://hashcat.net/wiki/doku.php?id=mask_attack hashcat -m 2500 -a 3 -2 ABC -3 ?l?u?d hash.txt D?2?3?3?3?3?3?3 -1, -2, -3, -4 are the custom charsets (--custom-charset1 ... --custom-charset...
philsmd hashcat 8 2,780 08-01-2019, 09:30 PM
    Thread: Multiple hash type mode
Post: RE: Multiple hash type mode

you can just run 6213 to also crack all hashes that can be cracked with 6211 or 6212 i..e 6213 can crack all 6212 hashes too which can crack all 6211 hashes too (the inverse e.g. 6211 cracking a...
philsmd hashcat 8 3,445 08-26-2019, 02:51 PM
    Thread: Multiple hash type mode
Post: RE: Multiple hash type mode

yeah, that's true that 6233 is able to crack all 6232 hashes which is able to crack all 6231 hashes Furthermore, 6223 is able to crack all 6222 hashes which is able to crack all 6221 hashes but at...
philsmd hashcat 8 3,445 08-26-2019, 03:07 PM