Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author [desc] Forum Replies Views Posted
    Thread: -m 11600 7z
Post: RE: -m 11600 7z

Yeah, you are right it sometimes depends on how "experimental" the beta currently is. Sometimes (actually very often) betas contain fixes for known problems/bugs and therefore at that very moment we r...
philsmd hashcat 3 4,073 08-02-2017, 10:56 AM
    Thread: DES-ECB Numeric Key Search
Post: RE: DES-ECB Numeric Key Search

just use -1 charsets/DES_special/DES_numeral.charset
philsmd hashcat 3 3,522 08-03-2017, 07:48 AM
    Thread: DES-ECB Numeric Key Search
Post: RE: DES-ECB Numeric Key Search

you still need to use --hex-charset also for charsets/DES_special/DES_numeral.charset since the charset is in hexadecimal format
philsmd hashcat 3 3,522 08-03-2017, 09:32 AM
    Thread: mask attack with a max occurrence
Post: RE: mask attack with a max occurrence

maskprocessor (https://github.com/hashcat/maskprocessor) has 2 options: -q, --seq-max=NUM Maximum number of multiple sequential characters -r, --occurrence-max=NUM Maximum number of o...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 2 4,163 08-03-2017, 04:59 PM
    Thread: Users with the same hash not in output
Post: RE: Users with the same hash not in output

Can you please make sure that you use the newest version of hashcat? Which version of hashcat do you use?
philsmd hashcat 2 2,884 08-03-2017, 05:53 PM
    Thread: Cracking MySQL/MariaDB Hashes
Post: RE: Cracking MySQL/MariaDB Hashes

--increment-min and --increment-max are command line arguments that can be used in a mask attack (-a 3. Well, it is also supported in -a 6 and -a 7 actually, but always together with masks). if you u...
philsmd General Talk 2 5,985 08-04-2017, 07:39 AM
    Thread: Epic cracking!
Post: RE: Epic cracking!

@slayerdiangelo I think it has to do with your statement Quote: -- even a 20 char long hash can be cracked within minutes -- Therefore, it was actually you that made this exaggerated claim and o...
philsmd hashcat 17 13,901 08-04-2017, 07:46 AM
    Thread: Hi, noob query.
Post: RE: Hi, noob query.

yes: https://hashcat.net/faq/#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword
philsmd hashcat 1 2,307 08-07-2017, 07:40 AM
    Thread: Please Help
Post: RE: Please Help

... "wallet", "encrypted" ... this could be anything. There are literally thousands of different "wallet" types. What type of wallets are you talking about? Which software was used to generate/u...
philsmd hashcat 5 4,722 08-07-2017, 07:44 AM
    Thread: Ubuntu 16.04 LTS NVIDIA Setup Guide
Post: RE: Ubuntu 16.04 LTS NVIDIA Setup Guide

We, in general, do not recommend using the package maintainers versions of the proprietary driver, since our experience showed they are either totally out-of-date or the packages are totally messed up...
philsmd User Contributions 21 33,866 08-07-2017, 08:02 AM
    Thread: Please Help
Post: RE: Please Help

If you have the wallet.dat file, you could just use the normal steps: 1. use bitcoin2john.py (https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/bitcoin2john.py) to extra...
philsmd hashcat 5 4,722 08-07-2017, 08:14 AM
    Thread: How to set the minimum password length?
Post: RE: How to set the minimum password length?

from https://hashcat.net/wiki/doku.php?id=rule_based_attack#rules_used_to_reject_plains : Quote: -- Reject rules only work either with hashcat-legacy, or when using “-j” or “-k” with hashc...
philsmd hashcat 5 7,345 08-07-2017, 10:14 PM
    Thread: Locked out of Keepass 1.x
Post: RE: Locked out of Keepass 1.x

if you do not know how to escape special characters within your command, you should just use a hash file. Code: -- hashcat64.exe -m 13400 -a 3 hash_file.txt ?l?l?l?l?l?l?l -- of course the file "h...
philsmd hashcat 6 7,596 08-08-2017, 07:09 AM
    Thread: Using for Axcrypt
Post: RE: Using for Axcrypt

As already explained above, for axcrypt 1.x (every version of ax less than 2.0) you could just use axcrypt2john.py (https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/axcr...
philsmd hashcat 10 11,238 08-08-2017, 11:45 AM
    Thread: Locked out of Keepass 1.x
Post: RE: Locked out of Keepass 1.x

you are not allowed to post hashes here. Respect the forum rules or you get banned immediately. It also can't be that difficult to use the same format of the example hash also for your hash. You ...
philsmd hashcat 6 7,596 08-08-2017, 01:55 PM
    Thread: Axcrypt: axcrypt2john.py (how to use python)
Post: RE: Using for Axcrypt

My guess is that you should just use the correct python version and therefore: you do not need to change the .py file at all. With "the correct" version of python it should work without problems. ...
philsmd hashcat 8 7,831 08-08-2017, 04:07 PM
    Thread: Axcrypt: axcrypt2john.py (how to use python)
Post: RE: Axcrypt: axcrypt2john.py (how to use python)

I understand that it's not your day to day job to develop or run code, but you should at least try to do some research and think about it. This is not that difficult at all. There are literally thous...
philsmd hashcat 8 7,831 08-08-2017, 09:37 PM
    Thread: Hashcat cant find my GPU
Post: RE: Hashcat cant find my GPU

Well, that should be very obvious. There are only 2 possibilities: 1. either you mess around with setting up a system that uses ancient drivers/hashcat/windows (this is not supported by the drivers m...
philsmd hashcat 3 5,297 08-09-2017, 08:28 AM
    Thread: foreign words and --remove
Post: RE: foreign words and --remove

for question number 1 it depends on the type of hashes and also on your hardware (SSD, RAM, CPU) etc. In my experience, you shouldn't bother too much about removing hashes if you do not crack (and the...
philsmd hashcat 3 3,868 08-09-2017, 08:57 AM
    Thread: Pronouncable passwords cracking
Post: RE: Pronouncable passwords cracking

Unfortunately, you can't recover a random password that is that long within a reasonable amount of time. Just do the math: ?u?l = 26+26 = 52 characters ?d = 10 characters => 52 * 52 * 52 * 52 * 52...
philsmd hashcat 3 3,417 08-10-2017, 03:56 PM