Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order
Post: RE: bruteforce wpa2 from 9999999999 to 6000000000 ...

(you should use ?1 if you set -1 )
philsmd hashcat 7 4,636 11-23-2018, 11:41 AM
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

yeah. but even for the approach with testing first password candidates at the end, you could actually just use -s / -l until the whole keyspace was tested, i.e. split your keyspace in x chunks and te...
philsmd hashcat 9 1,579 04-26-2020, 03:39 PM
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

Furthermore, the left side is changed most frequently. Is there any reason why you would need to change the order ? You might be able to create a new hcstat2 file with hcstat2gen from hashcat-ut...
philsmd hashcat 9 1,579 04-26-2020, 09:03 AM
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

The --keyspace , --skip and --limit usage is very intuitive. You just first determine the total "keyspace" (https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace) with ...
philsmd hashcat 9 1,579 04-27-2020, 08:54 AM
    Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?

does it work with -D 1 added to the command line: Code: -- hashcat -m 1000 -a 3 -O -D 1 easyntlm.txt ?l?l?l?l -- To me this really seems like a (very dangerous) driver bug. since the self-test...
philsmd hashcat 8 1,281 06-25-2020, 12:20 AM
    Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?

the -D 1 parameter does whitelist your CPU device (the Intel i7) cpu (see --help for all the command line parameters that hashcat supports and what they mean). that means that with -D 1 you are testi...
philsmd hashcat 8 1,281 06-25-2020, 12:49 AM
    Thread: bruteforce mode strange behavior
Post: RE: bruteforce mode strange behavior

you need to quote the -1 argument otherwise the command line will interpret some characters as special commands.
philsmd Old oclHashcat Support 1 5,048 12-27-2013, 07:58 AM
    Thread: Bruteforce + dictionary attack
Post: RE: Bruteforce + dictionary attack

you should be able to find the answer to your problem in the wiki https://hashcat.net/wiki/
philsmd Old oclHashcat Support 3 5,972 12-11-2014, 10:55 PM
    Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...

PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just sha256 (sha256 (sha256 ($pass))) and therefore tripple sha256 I do not have an example hash, ...
philsmd hashcat 8 6,872 02-13-2018, 12:18 AM
    Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...

Well, there is no secret at all. The neo code is open source and even already linked above. Here for instance is the verify function: https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6...
philsmd hashcat 8 6,872 02-13-2018, 10:08 AM
    Thread: Brute Forcing LM/NTLM with non ASCII Characters
Post: RE: Brute Forcing LM/NTLM with non ASCII Character...

if you want to change kernel files that are using sha512_update_global_utf16le_swap into kernel files that use sha512_update_global_swap (without utf16le), you would need to change it for every attack...
philsmd hashcat 2 538 07-31-2020, 04:35 PM
    Thread: Brute Force WPA2
Post: RE: Brute Force WPA2

no 1. --incremental is not a valid oclHashcat switch, I think you mean --increment (always double-check the switches with the --help output): -i, --increment Enable increment mode ...
philsmd Old oclHashcat Support 4 9,866 02-18-2015, 07:18 PM
    Thread: Brute Force WPA2
Post: RE: Brute Force WPA2

the mask is still missing, and this "-a ?l?u?d" is not valid syntax With all this information I just did give you, you should easily understand that this is what you are looking for: Code: -- oclha...
philsmd Old oclHashcat Support 4 9,866 02-18-2015, 08:08 PM
    Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)

Code: -- hashcat64.exe -m 900 -a 3 -w 3 -O -2 ?l?d hashmd4.txt ?2?2?2?2?2?2?2?2?2?2?2 --
philsmd hashcat 9 3,465 11-22-2019, 08:55 PM
    Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)

I don't agree that "H", "K", "M" and "P" are lowercase characters. It's probably also not the best idea to mask attack such passwords (there are some exception, e.g. if you know that those password...
philsmd hashcat 9 3,465 11-29-2019, 09:34 AM
    Thread: brute force resume
Post: RE: brute force resume

Sorry what are you talking about? oclHashcat has support for restoring a cracking job, see: https://hashcat.net/wiki/doku.php?id=oclhashcat#resume_support BTW: cpu hashcat can also restore a task wi...
philsmd Old oclHashcat Support 2 6,890 02-16-2015, 12:33 PM
    Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!

You need to download this file: https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/ethereum2john.py (Save as "ethereum2john.py" without quotes). then run it with python...
philsmd hashcat 9 7,903 01-03-2018, 11:48 AM
    Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!

No, the parameters N, r, p are only used with scrypt. Therefore it can't be -m 15600 Did you even do what I told you ? Did you run the python interpreter with the ethereum2john.py file and the json...
philsmd hashcat 9 7,903 01-03-2018, 12:58 PM
    Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC

Code: -- $ cat dict.txt abcd $ cat m0160.txt # masked 8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc46c:1234 $ ./hashcat-cli64.bin --quiet -m 160 m0160.txt dict.txt 8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc4...
philsmd Old hashcat Support 12 31,848 07-31-2013, 06:01 PM
    Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC

Of course that is not good for attacking the hash, if you miss important information (the salt/key in general is known). You could try to generate a list of salts (e.g. w/ maskprocessor and a suitabl...
philsmd Old hashcat Support 12 31,848 07-31-2013, 06:58 PM