Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: foreign words and --remove
Post: RE: foreign words and --remove

for question number 1 it depends on the type of hashes and also on your hardware (SSD, RAM, CPU) etc. In my experience, you shouldn't bother too much about removing hashes if you do not crack (and the...
philsmd hashcat 3 3,868 08-09-2017, 08:57 AM
    Thread: format username:password?
Post: RE: format username:password?

https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword btw: https://www.techsolvency.com/p...
philsmd hashcat 3 151 Yesterday, 12:31 PM
    Thread: format username:password?
Post: RE: format username:password?

just make sure that the input is correct and also remember that the way to do it is 2-fold (2 steps are needed ), i.e. first crack such that the cracked hashes with password end up in the .potfile, on...
philsmd hashcat 3 151 10 hours ago
    Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash

it's hash mode -m 7100 | OSX v10.8, OSX v10.9, OSX v10.10 | Operating-Systems also see https://hashcat.net/wiki/example_hashes for example hashes (search for OS X v10.8 / v10.9)
philsmd hashcat 5 8,048 01-24-2017, 09:30 PM
    Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash

You can "truncate"/cut the hash itself @ the same length used by the example hash :)
philsmd hashcat 5 8,048 01-24-2017, 09:56 PM
    Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?

Status...........: Cracked it's very obvious if it's cracked or not
philsmd hashcat 9 3,254 09-05-2019, 12:51 PM
    Thread: full parallel power of device
Post: RE: full parallel power of device

-a 3 means mask attack (https://hashcat.net/wiki/doku.php?id=mask_attack) so what you basically did is run a dictionary (the dictionary attack would be -a 0) with -a 3, i.e. run each word in the ma...
philsmd hashcat 6 1,844 12-23-2019, 08:54 AM
    Thread: Generating dictonary
Post: RE: Generating dictonary

The best solution is to use mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack Code: -- hashcat -m 0 -a 3 hash.txt ?u?u?u?u?u?u?u?u --
philsmd General Talk 12 8,565 07-25-2018, 07:27 PM
    Thread: Generator mscash2?
Post: RE: Generator mscash2?

1. you are not allowed to post hashes here (see https://hashcat.net/forum/announcement-2.html ), why can't you just say what the problem is (or at least mask the hash) ? 2. The error probably says line...
philsmd General Help 3 11,612 08-16-2013, 08:20 PM
    Thread: Generator of fortune
Post: RE: Generator of fortune

what's going on here? one (actually 2) completely new forum accounts without any previous posts suddently talking about a tool with very strange description and furthermore a tool that was already con...
philsmd User Contributions 8 2,022 06-15-2020, 11:06 AM
    Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt

N3HL Wrote: (01-30-2015, 02:05 PM) -- im completely new to hashcat, and I noticed it's missing some docs -- Not at all, the docs are: 1. https://hashcat.net/wiki/ 2. --help output of oclHashcat or c...
philsmd Old hashcat Support 9 47,256 01-30-2015, 04:43 PM
    Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt

you could use the --username switch of hashcat/oclHashcat. input format (you must use the --username switch to crack the hashes): username:hash:salt second step (after cracking); you can output it w...
philsmd Old hashcat Support 9 47,256 01-30-2015, 05:45 PM
    Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt

--show is always used to show the cracks for a specific oclHashcat session after the actual cracking process is done. So it would look like this: oclHashcat64.exe -m 2811 --username hashes.txt dict....
philsmd Old hashcat Support 9 47,256 01-30-2015, 06:24 PM
    Thread: getcernelarginfo procedure entry point not found in library
Post: RE: getcernelarginfo procedure entry point not fou...

it's probably kernel with "k" (clGetKernelArgInfo () ) for the problem itself, it's probably a setup/driver issue. Your explanation is also very misleading and missing some crucial facts. I think y...
philsmd hashcat 1 746 12-08-2019, 01:36 PM
    Thread: Getting 0H/S and 0 progress
Post: RE: Getting 0H/S and 0 progress

Code: -- hashcat -m 7100 -a 0 hash.txt dict.txt --
philsmd hashcat 3 6,120 07-25-2018, 07:25 PM
    Thread: Getting a Hash Via DD From a VeraCrypt File
Post: RE: Getting a Hash Via DD From a VeraCrypt File

... if you are using crunch together with hashcat you are probably doing something wrong (well, this might not always be the case, but most of the time for new users!) hashcat has all the attack mode...
philsmd hashcat 4 5,596 03-30-2017, 12:21 PM
    Thread: Getting a weird hash from PDF?
Post: RE: Getting a weird hash from PDF?

As far as I know the current up-to-date script to extract the info from .pdf files is pdf2john.pl (a perl file not a python file): https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleedin...
philsmd hashcat 2 3,265 11-10-2017, 10:17 PM
    Thread: good wordlist
Post: RE: good wordlist

hmm, interesting. but the site looks quite bad/fishy. "tested on neighbours Wi-Fi", bitcoin address, "must-have", big password list to download (let me explain below).... and back to the topic,...
philsmd User Contributions 2 4,253 12-19-2018, 11:02 AM
    Thread: GPU comparison (passwords per second)
Post: RE: GPU comparison (passwords per second)

For example this: https://www.golubev.com/gpuest.htm
philsmd Hardware 4 12,882 05-27-2014, 07:25 PM
    Thread: GPU Crack Speed Half of Expected
Post: RE: GPU Crack Speed Half of Expected

the commands that you use are very weird/wrong: 1. the -w that you use twice in your -a 0 (dictionary attack) is wrong. why two times -w ? one time -w without the actual workload profile 2. in t...
philsmd hashcat 3 786 06-30-2020, 07:43 AM