Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: md5(md5($pass).$salt)
Post: RE: md5(md5($pass).$salt)

This is the algo used by vbulletin, see the --help output: hashcat supports: -m 2611 = vBulletin < v3.8.5 and -m 2711 = vBulletin >= v3.8.5 the difference is mainly the supported salt length (s...
philsmd hashcat 1 2,176 08-20-2018, 09:48 AM
    Thread: MD5: Need Advice
Post: RE: MD5: Need Advice

well, you could just use -m 3710 = md5($salt.md5($pass)) together with --hex-salt (because you said that the first MD5 is in binary not hex), an example (hashes mask with xxxx): Code: -- $ echo -n ...
philsmd hashcat 21 20,788 05-12-2017, 08:55 AM
    Thread: MD5: Need Advice
Post: RE: MD5: Need Advice

If you are sure that the algorithm is: md5_hex(md5($salt) . md5_hex($pass)) ... where md5 (x) is the binary/raw output and md5_hex (y) is the hexadecimal output... then it should work. just try it...
philsmd hashcat 21 20,788 05-12-2017, 09:17 AM
    Thread: MD5: Need Advice
Post: RE: MD5: Need Advice

Well, I guess if we agree that the algorithm is MD5(MD5_raw ($salt) . MD5_raw ($pass)) you could convert those hashes to just MD5 ($salt_new . MD5_raw ($pass)) where $salt_new is the precomputed MD5 d...
philsmd hashcat 21 20,788 05-14-2017, 07:03 AM
    Thread: MD5: Need Advice
Post: RE: MD5: Need Advice

a, b, c, d, 0x80 and the remaining buffers are all 0 (that should be very obvious if you think about it, it must get shorter if we do not use hex but binary instead, it will be halved i.e. 32/2 = 16)....
philsmd hashcat 21 20,788 05-15-2017, 07:23 PM
    Thread: MD5: Need Advice
Post: RE: MD5: Need Advice

Nope, not at all! I just wrote: Quote: -- the remaining buffers are all 0 -- 0 means zero and not something else (like insert the salt buffer etc, I didn't write that). I can't help you ...
philsmd hashcat 21 20,788 05-15-2017, 07:56 PM
    Thread: MD5: Need Advice
Post: RE: MD5: Need Advice

Yeah, I figured that it might be very new to you to read C (or OpenCL code), but I really do not get why you use code like "w0_t[0] |= a;" when it should be just "w0_t[0] = a;" etc... (i.e. replace th...
philsmd hashcat 21 20,788 05-15-2017, 08:27 PM
    Thread: MD5: Need Advice
Post: RE: MD5: Need Advice

Yeah, it's completely wrong. Redownload a fresh copy of hashcat and do the changes correctly as I told you (I even highlighted a full set of lines you need to change so in theory you couldn't miss the...
philsmd hashcat 21 20,788 05-15-2017, 08:37 PM
    Thread: Merge .16800 files into a single one
Post: RE: Merge .16800 files into a single one

Linux: Code: -- cat single_captures/*.16800 > all_in_one/multi.16800 -- Windows: Code: -- copy single_captures\*.16800 all_in_one\multi.16800 -- [hr] alternatively, if all files are...
philsmd hashcat 1 609 04-28-2020, 04:50 PM
    Thread: merge dictionary or not?
Post: RE: merge dictionary or not?

It makes sense if there are a lot of duplicates. On linux you would just sort and unique the words with "sort -u" Code: -- sort -u wordlist_folder/* -o sort_and_uniqued.txt --
philsmd hashcat 2 2,687 12-03-2017, 10:27 AM
    Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data

it will probably make some checks (in the future if really incompatible data was found, but of course the goal is to make it downwards compatible for sure) based on the version number see src/brain.c ...
philsmd hashcat 8 2,475 10-12-2019, 09:30 AM
    Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data

in the current directory from which you start the brain server: 1. brain.$session.ldmp for the hashed passwords dumps (hash database) 2. brain.$session.admp for the attack positions dumps (attack da...
philsmd hashcat 8 2,475 10-15-2019, 04:31 PM
    Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data

the files are only stored on the brain server (not the clients). there is a default --brain-client-features, namely --brain-client-features 2 . that means that if you do not specify any, it default...
philsmd hashcat 8 2,475 10-15-2019, 05:14 PM
    Thread: minimum password length with mask
Post: RE: minimum password length with mask

This problem was fixed very quickly with these changes: https://github.com/hashcat/hashcat/pull/1485 You can already download a fixed (beta) version of hashcat from: https://hashcat.net/beta/ Th...
philsmd hashcat 6 8,088 01-03-2018, 05:57 PM
    Thread: minimum password length with mask
Post: RE: minimum password length with mask

Yes this seems to be a bug: see Code: -- Skipping mask '?u?l?l' because it is smaller than the minimum password length. [s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit => Session.........
philsmd hashcat 6 8,088 01-03-2018, 03:04 PM
    Thread: Missing hashcat-cli64.app for OSX 10.11.5
Post: RE: Missing hashcat-cli64.app for OSX 10.11.5

No, there is not really a file missing. Mac OSX users currently need to build the binary themself for reasons explained in https://github.com/hashcat/hashcat/issues/403 , https://github.com/hashcat/ha...
philsmd hashcat 3 6,105 07-29-2016, 10:29 AM
    Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?

Just to make sure that other users interested in something like this do not choose a wrong approach to do these types of attacks: if you are cracking a "salted" hash, you should use the corresponding ...
philsmd hashcat 7 5,475 03-18-2018, 07:46 PM
    Thread: Mix of digits, uppercase and a specific letter rule - help
Post: RE: Mix of digits, uppercase and a specific letter...

What you normally use in such a case is a mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack Therefore, in hashcat's terminology this is not called a rule, but a mask attack (using attac...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 2,952 11-14-2017, 09:06 AM
    Thread: Mode 11300
Post: RE: Mode 11300

the padding is known, we exploit this (padding attack, last few bytes 16 or 8 depending on the wallet type): https://github.com/hashcat/hashcat/blob/3dd89bc63c2614b57db58bd7b05d2d61dcc5ab75/OpenCL/...
philsmd hashcat 1 251 09-24-2020, 10:17 PM
    Thread: Modifiations to hash type 18100 to support binary seeds
Post: RE: Modifiations to hash type 18100 to support bin...

yeah, that's a too large keyspace. it's 32 ^ 16 = 1,208,925,819,614,629,174,706,176
philsmd hashcat 3 1,652 08-30-2019, 08:26 AM