Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

The general idea is good @backtraffic... but ... we really are trying hard to discourage the use of hardware without (good) cooling solutions here. so it's probably better to say: do NOT use any l...
philsmd hashcat 11 8,625 01-03-2020, 11:48 AM
    Thread: crack excel password with hashcat, possible?
Post: RE: crack excel password with hashcat, possible?

Code: -- python office2hashcat.py the_path_to_your_excel_file_here.xls --
philsmd General Talk 6 23,546 06-30-2017, 09:17 AM
    Thread: crack rar
Post: RE: crack rar

Why do you claim that it is not working ? It is working perfectly fine with -m 12500 = RAR3-hp The hash even has the signature ($RAR3$*0*) that makes it very clear that no other mode than -m 12500 sh...
philsmd hashcat 5 10,703 07-21-2016, 01:45 PM
    Thread: Cracked hashes during hashcat --restore not written to potfile
Post: RE: Cracked hashes during hashcat --restore not wr...

Code: -- ./hashcat -- is different from Code: -- hashcat -- if installed, the $HOME/.hashcat/ directory is used: https://github.com/hashcat/hashcat/commit/0c65bc6ba3fd5c9068f751346d0533c...
philsmd hashcat 10 657 09-19-2020, 10:56 PM
    Thread: Cracked hashes during hashcat --restore not written to potfile
Post: RE: Cracked hashes during hashcat --restore not wr...

did you copy the hashcat.restore file from another directory ? The .restore file contains a path from which hashcat was originally launched (cwd, see https://hashcat.net/wiki/doku.php?id=restore#sc...
philsmd hashcat 10 657 09-20-2020, 09:08 AM
    Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain

which --brain-client-features are you using ? you must be more precise when you make such statements
philsmd hashcat 9 2,508 10-17-2019, 06:19 PM
    Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain

furthermore, if you are looking for distributed cracking, you better consider using hashtopolis or similars (hashtopolis also has support for brain features as far as I know). brain is not meant to...
philsmd hashcat 9 2,508 10-17-2019, 06:25 PM
    Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain

no, this has nothing to do with --restore and -2 and -3 are also very different things (--custom-charset1 ... --custom-charset4). you need to specify --brain-client-features 1 or --brain-client-fea...
philsmd hashcat 9 2,508 10-17-2019, 06:28 PM
    Thread: Cracking 10 digit password with CudaHashcat
Post: RE: Cracking 10 digit password with CudaHashcat

See https://hashcat.net/wiki/doku.php?id=mask_attack According to that wiki, you should just use a mask that includes those chars/numbers, i.e: 760?d?d?d?d?d?d?d Full command: cudahashcat --h...
philsmd Old oclHashcat Support 7 21,695 08-20-2014, 04:22 PM
    Thread: Cracking an OS X 10.8.2 PBKDF2 Hash
Post: RE: Cracking an OS X 10.8.2 PBKDF2 Hash

The wiki clearly says what hash mode you should use: https://hashcat.net/wiki/doku.php?id=example_hashes 7100 OS X v10.8 So you need -m 7100 in your command line... Furthermore, if you want to u...
philsmd Old oclHashcat Support 5 14,790 12-12-2013, 08:28 PM
    Thread: Cracking Android Pattern Hash
Post: RE: Cracking Android Pattern Hash

Hi budabob07, I don't think that there is something special w/ the pattern hashes... Maybe the only thing that you could argue is that they are (ALSO) special insecure... I mean, it is correct that t...
philsmd Very old oclHashcat-lite Support 5 21,750 03-24-2013, 01:31 PM
    Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode

The command makes no sense. Defining any custom charset like --custom-charset1 (or short -1) without using it within the mask doesn't make any sense and is actually quite a common user mistake. :( ...
philsmd hashcat 7 1,538 05-10-2020, 07:29 AM
    Thread: Cracking hash
Post: RE: Cracking hash

do not post any hashes: https://hashcat.net/forum/announcement-2.html
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 2 2,644 04-06-2020, 09:13 PM
    Thread: Cracking multiple WPA2 hashes?
Post: RE: Cracking multiple WPA2 hashes?

see https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_crack_multiple_wpa_handshakes_at_once and https://hashcat.net/wiki/doku.php?id=hccapx
philsmd hashcat 2 3,118 10-19-2018, 06:34 PM
    Thread: Cracking MySQL/MariaDB Hashes
Post: RE: Cracking MySQL/MariaDB Hashes

--increment-min and --increment-max are command line arguments that can be used in a mask attack (-a 3. Well, it is also supported in -a 6 and -a 7 actually, but always together with masks). if you u...
philsmd General Talk 2 5,985 08-04-2017, 07:39 AM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

The 5 missing bytes will still be 256 * 256 * 256 * 256 * 256 = 256 ^ 5 = 1099511627776 combinations. That's a quite huge keyspace, even if the hashing algortihm (keccak) is quite fast. of course ...
philsmd hashcat 10 6,402 06-29-2018, 04:59 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

hashcat uses ?H for 0123456789ABCDEF therefore you could specify the mask as -a 3 --hex-charset [someting]?H[somethingElse]?H?H02 the main problem now is that the hash mode -m 5000 only supports a...
philsmd hashcat 10 6,402 06-29-2018, 05:46 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

the ciphertext gets decrypted into the raw seed if you have the correct password/AES key/ see my perl code https://github.com/hashcat/hashcat/issues/1279#issuecomment-351716733 Code: -- my $h...
philsmd hashcat 10 6,402 06-29-2018, 09:48 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

that's good that you mention this fact/doubt about the private key vs seed, chick3nman I assumed that the OP (uprising_bike) is sure that s/he has (part of) the seed, not the private key instead (t...
philsmd hashcat 10 6,402 06-30-2018, 07:56 AM
    Thread: Cracking pdf file with arabic password using hashcat
Post: RE: Cracking pdf file with arabic password using h...

You do not need --hex-salt. This has nothing to do with salts. If anything you would need --hex-charset, but that is not necessariy and only needed if you define a custom charset (-1, -2, -3 or -4)...
philsmd General Talk 5 16,216 11-21-2017, 05:58 PM