Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: how to create .rule and .hcmask files
Post: RE: how to create .rule and .hcmask files

I'm pretty sure they were both generated with PACK (Password Analysis and Cracking Kit): https://github.com/iphelix/pack https://web.archive.org/web/20190125201146/https://thesprawl.org/projects/pac...
philsmd hashcat 5 1,189 04-22-2020, 09:39 PM
    Thread: How to crack Keepass2 passcode, help me
Post: RE: How to crack Keepass2 passcode, help me

so you are using -m 13400 together with the modified (removed file names etc) output of keepass2john from bleeding-jumbo john the ripper (JTR) ? Well, it depends if the chars are appended/prepended...
philsmd hashcat 1 933 02-25-2020, 06:13 PM
    Thread: How to crack Apple Secure Notes?
Post: RE: How to crack Apple Secure Notes?

Code: -- hashcat -m 16200 -a 0 -w 3 -r rules/best64.rule hash_file.txt word_list.txt --
philsmd hashcat 3 678 07-12-2020, 07:18 PM
    Thread: How to crack a password in this way with hashcat ?
Post: RE: How to crack a password in this way with hashc...

This trac ticket https://hashcat.net/trac/ticket/539 seems to be related to your question. The main reasons it wasn't implemented yet, was that the full details about the maximum length devs should...
philsmd Old hashcat Support 1 4,407 03-26-2015, 11:50 AM
    Thread: How to configure Hashcat to append some data?
Post: RE: How to configure Hashcat to append some data?

Code: -- hashcat -m 1400 -a 3 -w 3 --hex-charset --custom-charset2 30 --custom-charset3 00 7627ffae5981fc58df32ea707d11d1acf72adc76d7b1a31b8a47c9fbd065a4a6 ?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?3?3?3?3?...
philsmd hashcat 4 706 07-24-2020, 07:23 PM
    Thread: How to configure Hashcat to append some data?
Post: RE: How to configure Hashcat to append some data?

Quote: -- But there is a problem running it. -- Why do you not just mention the error message ? I guess it's this: Quote: -- Integer overflow detected in keyspace of mask: ?2?2?2?2?2?2?2...
philsmd hashcat 4 706 07-25-2020, 08:20 AM
    Thread: How to calc (md5(md5($pwd).$salt) ?
Post: RE: How to calc (md5(md5($pwd).$salt) ?

This is the algorithm used by the forum software/board VBulletin. Hence, depending on the salt length, you either need to use -m 2611 (very short salts) or -m 2711 (longer salts). For examples see h...
philsmd Old hashcat Support 4 9,058 05-10-2015, 10:42 AM
    Thread: How to Bruteforce a part-known string?
Post: RE: How to Bruteforce a part-known string?

But it is the exact same thing for other length, if you want to do it in one run use for instance a script like this (untested, remove the "echo" if it seems to be ok for you): Code: -- hc_pre="...
philsmd Old hashcat Support 4 11,433 06-05-2013, 07:55 PM
    Thread: how to add custome hash type
Post: RE: how to add custome hash type

Trac is here (https://www.hashcat.net/trac) and you may need to register (https://hashcat.net/trac/register) if not already done (since trac is seperate from the forum and you need to create a new acco...
philsmd Old hashcat Support 16 29,653 10-21-2013, 10:18 AM
    Thread: how to add custome hash type
Post: RE: how to add custome hash type

See https://hashcat.net/wiki/doku.php?id=example_hashes , hashcat supports 2 vbulletin hash modes (both have some restrictions on the salt length etc). Anyway, by using -m 2611 == vBulletin < v3.8.5...
philsmd Old hashcat Support 16 29,653 10-21-2013, 01:27 PM
    Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...

The only way to know for sure is to have the source code (algorithm, or name and version of the platform, cms etc) that generated the hashes ... or to guess the algorithm by having at least one user f...
philsmd hashcat 13 2,704 04-18-2020, 01:25 PM
    Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...

you are NOT allowed to post hashes. read the forum rules. You will get banned by not following the rules. As far as I understand, you are saying the algorithm is basically: Code: -- echo -n --7...
philsmd hashcat 13 2,704 04-18-2020, 03:02 PM
    Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...

no, the salt must be with the dashes: [email protected]:848XXXc9e5baf34d6dba20XXX755f4984b6d77cc:--74e3c24fd83d92ea72383e9b3a4292bdfb8exxxx-- if you add users, you need to use --username to skip them. ...
philsmd hashcat 13 2,704 04-19-2020, 04:11 PM
    Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...

6 dashes total = 2+2 (around salt) + 2 (after pass) the rules only add 2 dashes, that's why I named the file append_two_dashes.txt
philsmd hashcat 13 2,704 04-19-2020, 04:34 PM
    Thread: how make charset?
Post: RE: how make charset?

you could just use a mask file (https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files) mask_file.hcmask Code: -- qweasdzxcmnblkjpoi,~ ,123,1——8 ?1?1?1?1?1?1?1?1 + 1——2 ?...
philsmd hashcat 3 696 07-14-2020, 12:09 PM
    Thread: how make charset?
Post: RE: how make charset?

that's the beauty and nice part of the flexibility of mask files (*.hcmask), you can just add however many mask you want, one after the other, line per line: if we would only consider a theoretical...
philsmd hashcat 3 696 07-14-2020, 07:31 PM
    Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256

also note that you can't use decrypt with hashes: https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/ something that isn't encrypted, can't in general be decrypted -m 1400 = S...
philsmd hashcat 6 1,263 05-29-2020, 09:15 PM
    Thread: how long it takes
Post: RE: how long it takes

no, that's not feasible random data is very difficult to brute-force starting with some (quite "small") lengths and I think you didn't really do the math here: 64 hex would be 16 ^ 64 = 1157920892...
philsmd General Talk 1 842 01-19-2020, 12:44 PM
    Thread: How hashcat work?
Post: RE: How hashcat work?

It's listed here: https://rocm.github.io/hardware.html I would recommend that you try ROCm: https://rocm.github.io/ROCmInstall.html you could also first to try if beta fixes the problem : https:...
philsmd hashcat 17 3,930 03-22-2020, 03:17 PM
    Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?

well, you should at least tell us the password, otherwise it's both against the forum rules and impossible for us to know how to test / verify it. I would say that looking at the code here https://...
philsmd hashcat 6 2,658 06-01-2019, 04:15 PM