Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: cuMemAlloc(): out of memory
Post: RE: cuMemAlloc(): out of memory
.... (what chick3nman said) and it of course has nothing to do with 32-bit binaries... hashcat doesn't ship with 32-bit executables anymore (you could still compile them yourself if somebody really ne... |
|
philsmd |
hashcat
|
3 |
239 |
09-23-2020, 05:53 PM |
|
|
Thread: cuCtxCreate(): unknown error
Post: RE: cuCtxCreate(): unknown error
try this: https://hashcat.net/faq/wrongdriver
which version of hashcat do you use ? does it work with --backend-ignore-cuda or without CUDA installed ? |
|
philsmd |
hashcat
|
3 |
302 |
09-23-2020, 05:56 PM |
|
|
Thread: Problems with the program after compilation
Post: RE: Problems with the program after compilation
try with -D 1
and https://hashcat.net/faq/wrongdriver |
|
philsmd |
hashcat
|
2 |
294 |
09-23-2020, 10:38 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
yeah, good that you guys pinpointed it. I didn't really look at the hash type, because thought you were just looking for the file in general.
Yeah, but it already works like this since several year... |
|
philsmd |
hashcat
|
14 |
1,235 |
09-24-2020, 07:42 PM |
|
|
Thread: Mode 11300
Post: RE: Mode 11300
the padding is known, we exploit this (padding attack, last few bytes 16 or 8 depending on the wallet type):
https://github.com/hashcat/hashcat/blob/3dd89bc63c2614b57db58bd7b05d2d61dcc5ab75/OpenCL/... |
|
philsmd |
hashcat
|
1 |
251 |
09-24-2020, 10:17 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
Code:
--
hashcat -m 6211 -a 3 -w 3 -o cracked.txt -i container.tc ?b?b?b
--
|
|
philsmd |
hashcat
|
14 |
1,235 |
09-24-2020, 11:07 PM |
|
|
Thread: tips on cracking SHA1 hash
Post: RE: tips on cracking SHA1 hash
Code:
--
-a 7 -1 ?u?d hash.txt ?1 dict.txt
--
or rules:
Code:
--
-a 0 -r my.rules hash.txt dict.txt
--
where my.rules is
Code:
--
^0
^1
^2
^3
^4
^5
^6
^7
^8
^9
^A
^B
^C... |
|
philsmd |
hashcat
|
3 |
396 |
09-24-2020, 11:11 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
as far as I understood it, you would need to specify more files or a folder instead.
Code:
--
hashcat -m 3200 -a 9 hash.txt dict_*.txt
--
or
Code:
--
hashcat -m 3200 -a 9 hash.txt dicts/... |
|
philsmd |
Beta Tester
|
21 |
3,761 |
09-29-2020, 07:22 PM |
|
|
Thread: -m 22600 Hashcat how extract hash?
Post: RE: -m 22600 Hashcat how extract hash?
I would suggest that if you are 100% sure that you are doing everything correctly, you should report the problem to John The Ripper (which develop the telegram2john.py tool) and try to investigate mor... |
|
philsmd |
hashcat
|
3 |
338 |
09-30-2020, 11:41 AM |
|
|
Thread: 4.6million character hash rar file
Post: RE: 4.6million character hash rar file
First of all, it would always make sense to post the hash type that you are trying to crack, also see https://hashcat.net/wiki/example_hashes .
latest beta version of hashcat (https://hashcat.net/bet... |
|
philsmd |
hashcat
|
2 |
340 |
10-02-2020, 02:52 PM |
|
|
Thread: Hashcat exhausted
Post: RE: Hashcat exhausted
The word list "rockyou.txt" doesn't contain the password "hashcat" (without quotes).
I don't see any evidence that your claim about a problem and that the password is within the dictionary file is ... |
|
philsmd |
hashcat
|
2 |
208 |
10-06-2020, 08:36 AM |
|
|
Thread: format username:password?
Post: RE: format username:password?
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword
btw: https://www.techsolvency.com/p... |
|
philsmd |
hashcat
|
3 |
148 |
Yesterday, 12:31 PM |
|
|
Thread: format username:password?
Post: RE: format username:password?
just make sure that the input is correct and also remember that the way to do it is 2-fold (2 steps are needed ), i.e. first crack such that the cracked hashes with password end up in the .potfile, on... |
|
philsmd |
hashcat
|
3 |
148 |
9 hours ago |