Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force

it's always clever to step back a little bit and first try to understand and analyse the feasibility of this attack and the total keyspace. My guess is that this is for WPA "hashes", so it's alread...
philsmd hashcat 7 1,442 06-17-2020, 07:17 PM
    Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force

it's negligible. the more words, the less likely is that a word occurs multiple times. As said, you could develop a fast password candidate generator that does all that fancy stuff: combining, conc...
philsmd hashcat 7 1,442 06-19-2020, 05:31 PM
    Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force

it's a very special situation, which requires either a special password generator or a compromise to allow some duplicates for better speed. The candidate generator could be as simple as this: Co...
philsmd hashcat 7 1,442 06-19-2020, 06:06 PM
    Thread: slow using rules
Post: RE: slow using rules

try with Code: -- -S -- added to your command line. Alternatively, you could generate a new dict or use stdin/pipe, but first test with -S added to your command line (only makes sense for "...
philsmd hashcat 7 1,056 07-28-2020, 09:07 PM
    Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)

not exactly true royce, it was once implemented as a separate kernel because of some special handling: see https://hashcat.net/forum/thread-6354.html and https://github.com/hashcat/hashcat/commit/82...
philsmd hashcat 7 873 08-10-2020, 07:07 PM
    Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)

you could use hashcat-legacy with your CPU from https://hashcat.net/files/hashcat-2.00.7z (deprecated, not supported anymore)  update: it seems that hashcat-legacy never supported -m 190... or just i...
philsmd hashcat 7 873 08-11-2020, 09:57 AM
    Thread: Looking to write a rule to replace digits
Post: RE: Looking to write a rule to replace digits

Code: -- hashcat --stdout -a 3 -o dict.txt Password?d?d?d hashcat --stdout -a 3 -o dict.txt My?d?d?dPassword hashcat -m 14800 -a 0 -w 3 hash.txt dict.txt --
philsmd hashcat 7 729 08-21-2020, 10:08 PM
    Thread: Segmentation fault [core dumped] by any execution.
Post: RE: Segmentation fault [core dumped] by any execut...

run clinfo and post the output after that also try this: https://hashcat.net/faq/wrongdriver
philsmd hashcat 7 594 08-25-2020, 06:57 PM
    Thread: Segmentation fault [core dumped] by any execution.
Post: RE: Segmentation fault [core dumped] by any execut...

what do you mean by stable ? which version do you use ? which version is working for you ?
philsmd hashcat 7 594 08-26-2020, 01:16 PM
    Thread: Looking to write a rule to replace digits
Post: RE: Looking to write a rule to replace digits

I don't think it's practical, you would need to combine rules with each and every combination (10x -r multi-rule replaces within the command, rule-chaining, to change mutliple digits at the same time)...
philsmd hashcat 7 729 08-22-2020, 10:11 AM
    Thread: NetNTLMv1 format
Post: RE: NetNTLMv1 format

This example works for me: Code: -- u4-netntlm::kNS:338d08f8e26de93300000000000000000000000000000000:9526fb8c23a90751cdd619b6cea564742e1e4bf33006ba41:cb8086049ec4736c -- Seems that the wiki page...
philsmd Very old oclHashcat-plus Support 6 20,096 05-16-2013, 03:35 PM
    Thread: Same hashes different results
Post: RE: Same hashes different results

Did some test now but was unable to reproduce this. Are you sure that the charset matches with the passwords, i.e. that all hashes *could* definitely be cracked by the mask? E.g are there no special c...
philsmd Very old oclHashcat-plus Support 6 13,507 05-22-2013, 03:06 PM
    Thread: Same hashes different results
Post: RE: Same hashes different results

I did now try to run the exactly same cmds on my machine (32bit, cuda - gtx 580, win) and I always get following output (tested w/ newest beta and w/ release version 0.14): Code: -- Recovered......:...
philsmd Very old oclHashcat-plus Support 6 13,507 05-25-2013, 10:28 AM
    Thread: How to map a password policy onto your Mask?
Post: RE: How to map a password policy onto your Mask?

Hey Rob, the best thing you should do is to have a look into the hashcat wiki https://hashcat.net/wiki/ and for your particular problem, see here: https://hashcat.net/wiki/doku.php?id=mask_attack Your...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 6 16,455 05-29-2013, 10:44 AM
    Thread: sha-1 with salt cracking issue
Post: RE: sha-1 with salt cracking issue

johnreich Wrote: (07-01-2013, 07:37 PM) -- ...am i doing something wrong? -- Yes, you post hashes here, while the forum rules clearly say you should NEVER post hashes. https://hashcat.net/forum/a...
philsmd Very old oclHashcat-plus Support 6 13,967 07-01-2013, 07:48 PM
    Thread: Salted SHA-1 found by Lite but not by Plus
Post: RE: Salted SHA-1 found by Lite but not by Plus

I would like to trac(k) this problem here: https://hashcat.net/trac/ticket/174
philsmd Very old oclHashcat-plus Support 6 10,960 07-03-2013, 06:34 PM
    Thread: sha-1 with salt cracking issue
Post: RE: sha-1 with salt cracking issue

Again, no reason to post hashes unmasked (but I see you now modified your 1st post, good). So are you able to generate the *same* hash w/ e.g. sha1sum or an online hash generator? If you are only abl...
philsmd Very old oclHashcat-plus Support 6 13,967 07-01-2013, 08:38 PM
    Thread: Salted SHA-1 found by Lite but not by Plus
Post: RE: Salted SHA-1 found by Lite but not by Plus

I don't know if this is a problem w/ lite, but it seems to output the digest just in byte-swapped format, see here to understand that (first plus - correct -, then lite): 4205d56d 6dd50542 what h...
philsmd Very old oclHashcat-plus Support 6 10,960 07-02-2013, 09:17 AM
    Thread: sha-1 with salt cracking issue
Post: RE: sha-1 with salt cracking issue

The algorithm could use and do literally everything. I mean, it could iterate a random number of times (and store the number in salt), it could split the salt and prefix/suffix it, append it, suffix ...
philsmd Very old oclHashcat-plus Support 6 13,967 07-02-2013, 09:29 AM
    Thread: Make Wordlist
Post: RE: Make Wordlist

I don't think that with 16 chars it is very clever and fast to generate a wordlist. Also, depending on the hash mode and your hardware setup, 16 chars may take quite long to bruteforce too Anyway, th...
philsmd General Talk 6 20,005 08-22-2013, 01:04 AM