Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys
but what does this tell us? I think kind of no news here.
It just means that I/O should be avoided and could always be a bottleneck (even if you use /dev/null and the /dev/null is highly optimized by... |
|
philsmd |
hashcat
|
3 |
3,323 |
03-19-2018, 09:22 AM |
|
|
Thread: Proper meaning of status codes?
Post: RE: Proper meaning of status codes?
-2 whenever the temperature limit was reached
-1 in case of errors (arguments or other inputs - also input files etc)
2 in case the 'q' key was hit
3 in case the 'c' key was hit (checkpoint quit f... |
|
philsmd |
hashcat
|
2 |
3,339 |
04-12-2017, 08:31 AM |
|
|
Thread: possible bug in ?a on 1.31
Post: RE: possible bug in ?a on 1.31
Maybe you can give the whole command line and tell us some example passwords which should be found.
Also, when you specify --increment (or short -i) you should also always specify the --increment-min... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,344 |
12-17-2014, 01:24 PM |
|
|
Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...
hmm, interesting. is there something like clinfo or even another common OpenCL-based benchmarking tool for windows that we can compare with ?
note: here (bottom of that page) I see 64 bit binaries fo... |
|
philsmd |
hashcat
|
10 |
3,347 |
10-08-2019, 10:47 AM |
|
|
Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...
please be more specific: which OpenCL program are you talking about ? (you can't really compare it with a program that doesn't use OpenCL)
also, did you try clinfo ? |
|
philsmd |
hashcat
|
10 |
3,347 |
10-17-2019, 07:35 PM |
|
|
Thread: Using PACK - Interesting Results
Post: RE: Using PACK - Interesting Results
This problem was already reported several months ago (see https://github.com/iphelix/pack/issues/1), but it wasn't merged yet.
I think there are some forked versions that integrate the fix, like th... |
|
philsmd |
General Talk
|
3 |
3,370 |
12-01-2017, 09:09 AM |
|
|
Thread: GTX 1060 3Gb
Post: RE: GTX 1060 3Gb
what happens if you try this:
Code:
--
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => s
--
can you show the output of hitting your s key on the keyboard |
|
philsmd |
Hardware
|
8 |
3,378 |
09-21-2019, 12:16 PM |
|
|
Thread: wallet.dat mode 11300: can make a hash from pywallet.py dump?
Post: RE: wallet.dat mode 11300: can make a hash from py...
it's the length of the next field. e.g the length of d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d57d6d01a58399ea04e703e8bbb44899039326f7a00f171a7bbc854a54 is 96 hexadecimal characters.
Please use bitcoi... |
|
philsmd |
hashcat
|
3 |
3,379 |
11-15-2018, 08:59 AM |
|
|
Thread: Pronouncable passwords cracking
Post: RE: Pronouncable passwords cracking
Unfortunately, you can't recover a random password that is that long within a reasonable amount of time.
Just do the math:
?u?l = 26+26 = 52 characters
?d = 10 characters
=> 52 * 52 * 52 * 52 * 52... |
|
philsmd |
hashcat
|
3 |
3,417 |
08-10-2017, 03:56 PM |
|
|
Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...
see the output of --help
sha256(md5(pass)) is not currently supported
-a 3 needs a mask and you specify a mask directly after the hash file
e.g.
Code:
--
./hashcat64.bin -a 3 -m 4700 -D 1... |
|
philsmd |
hashcat
|
9 |
3,421 |
07-13-2019, 08:18 AM |
|
|
Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...
Code:
--
perl tools/test.pl passthrough 0 < example.dict | hashcat -m 1400 -w 3 hash.txt
--
|
|
philsmd |
hashcat
|
9 |
3,421 |
07-13-2019, 12:22 PM |
|
|
Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...
c'mon this should be really obvious.
The error message says that you do not have the required perl modules installed
This thread is getting a little bit weird (the strange command line options, ... |
|
philsmd |
hashcat
|
9 |
3,421 |
07-13-2019, 03:21 PM |
|
|
Thread: can't get hashcat working!! ubuntu 16.04 w/ amd 7970s
Post: RE: can't get hashcat working!! ubuntu 16.04 w/ am...
it's a pretty old GPU already. Rocm doesn't seem to support it at all: see https://rocm.github.io/hardware.html . It seems that currencty only some new cards are supported (like the RX460, RX470, RX48... |
|
philsmd |
hashcat
|
3 |
3,426 |
07-28-2018, 04:08 PM |
|
|
Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4
please read this: https://github.com/hashcat/hashcat/issues/1806 |
|
philsmd |
hashcat
|
8 |
3,432 |
09-13-2019, 06:40 AM |
|
|
Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4
I don't think anybody has started working on implementing this algo in hashcat.
The details are kind of clear now given the proof of concept in perl.
It should be also doable to use that ellipti... |
|
philsmd |
hashcat
|
8 |
3,432 |
09-13-2019, 11:26 AM |
|
|
Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4
Closing this thread because we implemented both Electrum Wallet Salt-Type 4 and Salt-Type 5 with latest version (still in beta at the moment of this writing, https://hashcat.net/beta ) |
|
philsmd |
hashcat
|
8 |
3,432 |
12-09-2019, 09:42 AM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
you can just run 6213 to also crack all hashes that can be cracked with 6211 or 6212
i..e 6213 can crack all 6212 hashes too which can crack all 6211 hashes too
(the inverse e.g. 6211 cracking a... |
|
philsmd |
hashcat
|
8 |
3,445 |
08-26-2019, 02:51 PM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
yeah, that's true that 6233 is able to crack all 6232 hashes which is able to crack all 6231 hashes
Furthermore, 6223 is able to crack all 6222 hashes which is able to crack all 6221 hashes
but at... |
|
philsmd |
hashcat
|
8 |
3,445 |
08-26-2019, 03:07 PM |
|
|
Thread: Benchmark give some results but crash in particular hashes
Post: RE: Benchmark give some results but crash in parti...
did you try to test with the hashcat beta from https://hashcat.net/beta/ ? |
|
philsmd |
hashcat
|
4 |
3,461 |
11-18-2019, 02:20 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
Code:
--
hashcat64.exe -m 900 -a 3 -w 3 -O -2 ?l?d hashmd4.txt ?2?2?2?2?2?2?2?2?2?2?2
--
|
|
philsmd |
hashcat
|
9 |
3,465 |
11-22-2019, 08:55 PM |