Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption

because you probably should use the collider mode 9710 (with mask ?b?b?b?b?b) for instant access to the data
philsmd General Talk 9 15,352 08-21-2017, 08:58 AM
    Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption

If you read this carefully https://hashcat.net/forum/thread-3665.html, you will see that you only need -m 9710 to access the data. Have a look at the list of steps under the "KDF" section https://has...
philsmd General Talk 9 15,352 09-12-2017, 05:00 PM
    Thread: MS office 2013 Hash algo in python
Post: RE: MS office 2013 Hash algo in python

Well, the most suitable answer would be just read the kernel's source code (of e.g. -m 9600) and convert it to python (that may also - be the only thing that - help to get an idea about the optimizati...
philsmd General Talk 2 4,186 07-01-2016, 08:41 AM
    Thread: mozilla
Post: RE: mozilla

-1 0x01 ^ this is wrong syntax. where did you read about this 0x notation ? did you just guess this? hashcat has an option called --hex-charset and you can use it like this --hex-charset ?a?a?a...
philsmd hashcat 2 1,306 07-16-2019, 02:24 PM
    Thread: Most efficient way to crack wpa2 hash if you know first char?
Post: RE: Most efficient way to crack wpa2 hash if you k...

first of all, these concepts of "rainbow tables" and "oclhashcat" (from your other post) etc are superseded since several years. not sure how you even come up with these concepts and think this is som...
philsmd hashcat 3 1,941 08-02-2019, 01:15 PM
    Thread: Most efficient way to crack wpa2 hash if you know first char?
Post: RE: Most efficient way to crack wpa2 hash if you k...

in that case your password is probably written on a sticker on your router itself. Just have a look at your router (hardware).
philsmd hashcat 3 1,941 08-02-2019, 04:02 PM
    Thread: More then 4 user defined charsets
Post: RE: More then 4 user defined charsets

it is not supported to have more than 4 custom charset... there are several reasons for that (performance, GPU-related reasons etc)... There may be some rare cases where you *really* need that featur...
philsmd Very old oclHashcat-plus Support 3 6,837 11-07-2013, 01:19 PM
    Thread: modx modPBKDF2 hashes
Post: RE: modx modPBKDF2 hashes

The salt must also be specified as base64 encoded string, like this: Code: -- ./oclHashcat -m 10900 -a 3 --quiet 'sha256:1000:YTlhM2NkMmE1MmY0ZWFkOGJmZjQ3Nzk0MWNlYjYyZjU=:+7WYTHGVutZhmE9KYjb93Rvtd...
philsmd Old oclHashcat Support 4 8,476 02-26-2016, 11:03 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

see: https://hashcat.net/forum/thread-6638.html https://hashcat.net/forum/thread-2563-post-15255.html#pid15255
philsmd hashcat 8 3,607 04-18-2019, 02:43 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

maybe you just didn't understand the posts. depending on the output you get from your capture tool/dump (i.e. if it is NetNTLMv1 / NetNTLMv1+ESS or NetNTLMv2), you need to use -m 5500 or -m 5600. ...
philsmd hashcat 8 3,607 04-18-2019, 07:27 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

the domain is actually not used in computing the response and therefore can be skipped/ignored/anything, but the client challenge must be specified (e.g. 338d08f8e26de933000000000000000000000000000000...
philsmd hashcat 8 3,607 04-18-2019, 08:26 PM
    Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...

I guess this is just because you didn't test with the correct password candidate. hashcat only tries the passwords that you tell it to run. Maybe this specific hash is harder to crack and you need...
philsmd hashcat 8 3,607 04-19-2019, 11:44 AM
    Thread: Modify Session files to resume at choosen point
Post: RE: Modify Session files to resume at choosen poin...

That is easy and if you didn't find the answer in the forum already, you shoud find it easily by looking at the --help output: Code: -- -s,  --skip=NUM                    Skip number of ...
philsmd User Contributions 4 12,211 12-25-2015, 04:53 PM
    Thread: Modifiations to hash type 18100 to support binary seeds
Post: RE: Modifiations to hash type 18100 to support bin...

yeah, that's a too large keyspace. it's 32 ^ 16 = 1,208,925,819,614,629,174,706,176
philsmd hashcat 3 1,652 08-30-2019, 08:26 AM
    Thread: Mode 11300
Post: RE: Mode 11300

the padding is known, we exploit this (padding attack, last few bytes 16 or 8 depending on the wallet type): https://github.com/hashcat/hashcat/blob/3dd89bc63c2614b57db58bd7b05d2d61dcc5ab75/OpenCL/...
philsmd hashcat 1 251 09-24-2020, 10:17 PM
    Thread: Mix of digits, uppercase and a specific letter rule - help
Post: RE: Mix of digits, uppercase and a specific letter...

What you normally use in such a case is a mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack Therefore, in hashcat's terminology this is not called a rule, but a mask attack (using attac...
philsmd hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 2,952 11-14-2017, 09:06 AM
    Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?

Just to make sure that other users interested in something like this do not choose a wrong approach to do these types of attacks: if you are cracking a "salted" hash, you should use the corresponding ...
philsmd hashcat 7 5,475 03-18-2018, 07:46 PM
    Thread: Missing hashcat-cli64.app for OSX 10.11.5
Post: RE: Missing hashcat-cli64.app for OSX 10.11.5

No, there is not really a file missing. Mac OSX users currently need to build the binary themself for reasons explained in https://github.com/hashcat/hashcat/issues/403 , https://github.com/hashcat/ha...
philsmd hashcat 3 6,105 07-29-2016, 10:29 AM
    Thread: minimum password length with mask
Post: RE: minimum password length with mask

This problem was fixed very quickly with these changes: https://github.com/hashcat/hashcat/pull/1485 You can already download a fixed (beta) version of hashcat from: https://hashcat.net/beta/ Th...
philsmd hashcat 6 8,088 01-03-2018, 05:57 PM
    Thread: minimum password length with mask
Post: RE: minimum password length with mask

Yes this seems to be a bug: see Code: -- Skipping mask '?u?l?l' because it is smaller than the minimum password length. [s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit => Session.........
philsmd hashcat 6 8,088 01-03-2018, 03:04 PM