Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author [desc] Forum Replies Views Posted
    Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password

maybe the document can be opened without problem and without password but there are other protections in place like copy/print protection etc.
philsmd hashcat 10 8,001 02-08-2018, 06:49 PM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

You basically already answered your own question by explaining the algorithm details and linking to the algorithm description. Furthermore, this question was already recently addressed within this fo...
philsmd hashcat 26 24,603 02-10-2018, 07:39 PM
    Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat

does the example hash work for you? are you sure you are using the correct hash type? you need to use -m 12700
philsmd hashcat 10 8,863 02-11-2018, 09:35 AM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

The algorithm doesn't allow to recover the whole seed (if it was really generated in a cryptographically secure random way) by just knowing some bytes (let's say 80) of the encrypted seed (furthermore...
philsmd hashcat 26 24,603 02-11-2018, 02:24 PM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri...
philsmd hashcat 26 24,603 02-11-2018, 02:49 PM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

Now, thinking about the padding attack... I think an alternative could work without revealing the whole encseed. The thing is that the pre-sale algorithm uses padding (as already mentioned a couple...
philsmd hashcat 26 24,603 02-11-2018, 04:01 PM
    Thread: "Getting Help from Friends" -- Reverse my hash?
Post: RE: "Getting Help from Friends" -- Reverse my hash...

This discussion would also be interesting here: https://hashcat.net/forum/thread-6405-post-39256.html#pid39256 Basically, if you can reveal at least the last 2 blocks (2*16 bytes = 32 bytes) of the...
philsmd hashcat 4 3,766 02-11-2018, 07:20 PM
    Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key

it's not allowed to post hashes. The encryption used by the PDF algorithm uses a 128 bit key. This key is derived by a key-derivation-function and will be generated from your password as an inpu...
philsmd hashcat 4 4,061 02-12-2018, 10:51 PM
    Thread: Hybrid Attack
Post: RE: Hybrid Attack

This is a warning. It is not an error message. With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration.
philsmd hashcat 3 3,011 02-12-2018, 10:48 PM
    Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...

PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just sha256 (sha256 (sha256 ($pass))) and therefore tripple sha256 I do not have an example hash, ...
philsmd hashcat 8 6,872 02-13-2018, 12:18 AM
    Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...

Well, there is no secret at all. The neo code is open source and even already linked above. Here for instance is the verify function: https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6...
philsmd hashcat 8 6,872 02-13-2018, 10:08 AM
    Thread: [HELP] Hashcat Mask
Post: RE: [HELP] Hashcat Mask

for points 1 to 3 you could use maskprocessor. It supports the -q and -r command line arguments that filter out exactly the password candidates that do not match the policy that you described above. ...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 4 4,613 02-13-2018, 10:15 AM
    Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key

You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions). Mask attack is in general not a good strategy to recover a password f...
philsmd hashcat 4 4,061 02-13-2018, 12:04 PM
    Thread: [HELP] Hashcat Mask
Post: RE: [HELP] Hashcat Mask

That is just a hint how long WPA/WPA2 hashes could be in general (maximum allowed password length for WPA/WPA2). For some hash types there are even 2 different kernel files (optimized vs pure). For...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 4 4,613 02-13-2018, 12:30 PM
    Thread: Integer overflow error
Post: RE: Integer overflow error

No, this is correct. The number of password candidates is way too huge. Just do the math ?a has 95 characters. If we have a length of 15, we have 95^15. The result of 95*95*95*95*....*95 (15 times) ...
philsmd hashcat 5 3,907 02-14-2018, 08:37 AM
    Thread: Integer overflow error
Post: RE: Integer overflow error

I think it is the other way around. If we look at the file docs/changes.txt it mentions that the integer overflow check was first introduced with version 3.40 of hashcat. This is why you don't see t...
philsmd hashcat 5 3,907 02-14-2018, 09:20 AM
    Thread: Hashcat slows down after staring attack.
Post: RE: Hashcat slows down after staring attack.

You are trying to crack 779 networks. The benchmark only uses 1 single network to find out the maximum speed. The huge number of networks will reduce the overall speed almost linearly. The more ne...
philsmd hashcat 7 6,025 02-14-2018, 05:49 PM
    Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3

If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password candidates to a dictionary file and use the di...
philsmd hashcat 6 5,814 02-15-2018, 10:30 AM
    Thread: Hashcat slows down after staring attack.
Post: RE: Hashcat slows down after staring attack.

In theory you could just split your hccapx file into 779 equally large files (the size of 1 hccapx struct is also mentioned here: https://hashcat.net/wiki/doku.php?id=hccapx , it currently is 393 byte...
philsmd hashcat 7 6,025 02-15-2018, 05:51 PM
    Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat

See this issue https://github.com/hashcat/hashcat/issues/112 . I think it might be possible to just truncate the long encrypted data for -m 12700 = Blockchain, My Wallet . You could for instance tr...
philsmd hashcat 10 8,863 02-17-2018, 01:53 PM