Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt

N3HL Wrote: (01-30-2015, 02:05 PM) -- im completely new to hashcat, and I noticed it's missing some docs -- Not at all, the docs are: 1. https://hashcat.net/wiki/ 2. --help output of oclHashcat or c...
philsmd Old hashcat Support 9 47,256 01-30-2015, 04:43 PM
    Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt

you could use the --username switch of hashcat/oclHashcat. input format (you must use the --username switch to crack the hashes): username:hash:salt second step (after cracking); you can output it w...
philsmd Old hashcat Support 9 47,256 01-30-2015, 05:45 PM
    Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt

--show is always used to show the cracks for a specific oclHashcat session after the actual cracking process is done. So it would look like this: oclHashcat64.exe -m 2811 --username hashes.txt dict....
philsmd Old hashcat Support 9 47,256 01-30-2015, 06:24 PM
    Thread: Generator of fortune
Post: RE: Generator of fortune

what's going on here? one (actually 2) completely new forum accounts without any previous posts suddently talking about a tool with very strange description and furthermore a tool that was already con...
philsmd User Contributions 8 2,022 06-15-2020, 11:06 AM
    Thread: Generator mscash2?
Post: RE: Generator mscash2?

1. you are not allowed to post hashes here (see https://hashcat.net/forum/announcement-2.html ), why can't you just say what the problem is (or at least mask the hash) ? 2. The error probably says line...
philsmd General Help 3 11,612 08-16-2013, 08:20 PM
    Thread: Generating dictonary
Post: RE: Generating dictonary

The best solution is to use mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack Code: -- hashcat -m 0 -a 3 hash.txt ?u?u?u?u?u?u?u?u --
philsmd General Talk 12 8,565 07-25-2018, 07:27 PM
    Thread: full parallel power of device
Post: RE: full parallel power of device

-a 3 means mask attack (https://hashcat.net/wiki/doku.php?id=mask_attack) so what you basically did is run a dictionary (the dictionary attack would be -a 0) with -a 3, i.e. run each word in the ma...
philsmd hashcat 6 1,844 12-23-2019, 08:54 AM
    Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?

Status...........: Cracked it's very obvious if it's cracked or not
philsmd hashcat 9 3,254 09-05-2019, 12:51 PM
    Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash

it's hash mode -m 7100 | OSX v10.8, OSX v10.9, OSX v10.10 | Operating-Systems also see https://hashcat.net/wiki/example_hashes for example hashes (search for OS X v10.8 / v10.9)
philsmd hashcat 5 8,048 01-24-2017, 09:30 PM
    Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash

You can "truncate"/cut the hash itself @ the same length used by the example hash :)
philsmd hashcat 5 8,048 01-24-2017, 09:56 PM
    Thread: format username:password?
Post: RE: format username:password?

https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword btw: https://www.techsolvency.com/p...
philsmd hashcat 3 151 Yesterday, 12:31 PM
    Thread: format username:password?
Post: RE: format username:password?

just make sure that the input is correct and also remember that the way to do it is 2-fold (2 steps are needed ), i.e. first crack such that the cracked hashes with password end up in the .potfile, on...
philsmd hashcat 3 151 10 hours ago
    Thread: foreign words and --remove
Post: RE: foreign words and --remove

for question number 1 it depends on the type of hashes and also on your hardware (SSD, RAM, CPU) etc. In my experience, you shouldn't bother too much about removing hashes if you do not crack (and the...
philsmd hashcat 3 3,868 08-09-2017, 08:57 AM
    Thread: Floating Mask. How to?
Post: RE: Floating Mask. How to?

What you (@agenta) should consider is that this "floating technique" in theory is efficient/meaningful/clever only if the (different) charsets you are using (in your specific case there are 2, ?a and ...
philsmd General Talk 8 11,643 03-01-2016, 12:43 PM
    Thread: First Attempt, does this look alright?
Post: RE: First Attempt, does this look alright?

you could use mask files https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files or just set -1 "012345 6789" for the first byte of your mask (i.e. any set of chars, charset, that ha...
philsmd hashcat 8 1,060 07-16-2020, 08:03 PM
    Thread: First Attempt, does this look alright?
Post: RE: First Attempt, does this look alright?

yeah, your command doesn't make sense to me at all. Why would you define all those custom charsets (-1 , -2 , -3 , -4) and only use ?4 in your mask ? That seems to be a misunderstanding/problem of ...
philsmd hashcat 8 1,060 07-16-2020, 08:29 PM
    Thread: First Attempt, does this look alright?
Post: RE: First Attempt, does this look alright?

The main problem now is that it's quite a long password. We "normally"/generally say that a length of 8-9 is the max that can be brute-forced (but attention: this depends a lot on hash type and/or ...
philsmd hashcat 8 1,060 07-16-2020, 11:19 PM
    Thread: FIFO help
Post: RE: FIFO help

If you are using just a few rules (or possibly even just 1), you can use -j/-k together with -a1 for each and every rule: Code: -- hashcat -m 1000 -a 1 -w 4 -j "$1 $2 $3" hash.txt dict1.txt dict2.tx...
philsmd hashcat 3 4,472 05-25-2017, 11:01 AM
    Thread: FIFO help
Post: RE: FIFO help

As said, the first approach (with -j/-k) should be used if you plan to use only very few rules: i.e. you can start hashcat a couple of times (one after the other in a sequence, or loop if you prefer) ...
philsmd hashcat 3 4,472 05-26-2017, 07:44 AM
    Thread: feature request: new hashtype support SSHA512 (LDAP)
Post: RE: feature request: new hashtype support SSHA512 ...

I made some test w/ this format... it seems very similar to the supported -m 1710 format (except the output format, but this is just a matter of fast conversion - base64 -d). See example here: https:...
philsmd General Help 5 11,493 08-09-2013, 01:50 PM