Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys

but what does this tell us? I think kind of no news here. It just means that I/O should be avoided and could always be a bottleneck (even if you use /dev/null and the /dev/null is highly optimized by...
philsmd hashcat 3 3,323 03-19-2018, 09:22 AM
    Thread: Proper meaning of status codes?
Post: RE: Proper meaning of status codes?

-2 whenever the temperature limit was reached -1 in case of errors (arguments or other inputs - also input files etc) 2 in case the 'q' key was hit 3 in case the 'c' key was hit (checkpoint quit f...
philsmd hashcat 2 3,339 04-12-2017, 08:31 AM
    Thread: possible bug in ?a on 1.31
Post: RE: possible bug in ?a on 1.31

Maybe you can give the whole command line and tell us some example passwords which should be found. Also, when you specify --increment (or short -i) you should also always specify the --increment-min...
philsmd Old oclHashcat Support 1 3,344 12-17-2014, 01:24 PM
    Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...

hmm, interesting. is there something like clinfo or even another common OpenCL-based benchmarking tool for windows that we can compare with ? note: here (bottom of that page) I see 64 bit binaries fo...
philsmd hashcat 10 3,347 10-08-2019, 10:47 AM
    Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...

please be more specific: which OpenCL program are you talking about ? (you can't really compare it with a program that doesn't use OpenCL) also, did you try clinfo ?
philsmd hashcat 10 3,347 10-17-2019, 07:35 PM
    Thread: Using PACK - Interesting Results
Post: RE: Using PACK - Interesting Results

This problem was already reported several months ago (see https://github.com/iphelix/pack/issues/1), but it wasn't merged yet. I think there are some forked versions that integrate the fix, like th...
philsmd General Talk 3 3,370 12-01-2017, 09:09 AM
    Thread: GTX 1060 3Gb
Post: RE: GTX 1060 3Gb

what happens if you try this: Code: -- [s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => s -- can you show the output of hitting your s key on the keyboard
philsmd Hardware 8 3,378 09-21-2019, 12:16 PM
    Thread: wallet.dat mode 11300: can make a hash from pywallet.py dump?
Post: RE: wallet.dat mode 11300: can make a hash from py...

it's the length of the next field. e.g the length of d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d57d6d01a58399ea04e703e8bbb44899039326f7a00f171a7bbc854a54 is 96 hexadecimal characters. Please use bitcoi...
philsmd hashcat 3 3,379 11-15-2018, 08:59 AM
    Thread: Pronouncable passwords cracking
Post: RE: Pronouncable passwords cracking

Unfortunately, you can't recover a random password that is that long within a reasonable amount of time. Just do the math: ?u?l = 26+26 = 52 characters ?d = 10 characters => 52 * 52 * 52 * 52 * 52...
philsmd hashcat 3 3,417 08-10-2017, 03:56 PM
    Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...

see the output of --help sha256(md5(pass)) is not currently supported -a 3 needs a mask and you specify a mask directly after the hash file e.g. Code: -- ./hashcat64.bin -a 3 -m 4700 -D 1...
philsmd hashcat 9 3,421 07-13-2019, 08:18 AM
    Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...

Code: -- perl tools/test.pl passthrough 0 < example.dict | hashcat -m 1400 -w 3 hash.txt --
philsmd hashcat 9 3,421 07-13-2019, 12:22 PM
    Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...

c'mon this should be really obvious. The error message says that you do not have the required perl modules installed This thread is getting a little bit weird (the strange command line options, ...
philsmd hashcat 9 3,421 07-13-2019, 03:21 PM
    Thread: can't get hashcat working!! ubuntu 16.04 w/ amd 7970s
Post: RE: can't get hashcat working!! ubuntu 16.04 w/ am...

it's a pretty old GPU already. Rocm doesn't seem to support it at all: see https://rocm.github.io/hardware.html . It seems that currencty only some new cards are supported (like the RX460, RX470, RX48...
philsmd hashcat 3 3,426 07-28-2018, 04:08 PM
    Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4

please read this: https://github.com/hashcat/hashcat/issues/1806
philsmd hashcat 8 3,432 09-13-2019, 06:40 AM
    Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4

I don't think anybody has started working on implementing this algo in hashcat. The details are kind of clear now given the proof of concept in perl. It should be also doable to use that ellipti...
philsmd hashcat 8 3,432 09-13-2019, 11:26 AM
    Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4

Closing this thread because we implemented both Electrum Wallet Salt-Type 4 and Salt-Type 5 with latest version (still in beta at the moment of this writing, https://hashcat.net/beta )
philsmd hashcat 8 3,432 12-09-2019, 09:42 AM
    Thread: Multiple hash type mode
Post: RE: Multiple hash type mode

you can just run 6213 to also crack all hashes that can be cracked with 6211 or 6212 i..e 6213 can crack all 6212 hashes too which can crack all 6211 hashes too (the inverse e.g. 6211 cracking a...
philsmd hashcat 8 3,445 08-26-2019, 02:51 PM
    Thread: Multiple hash type mode
Post: RE: Multiple hash type mode

yeah, that's true that 6233 is able to crack all 6232 hashes which is able to crack all 6231 hashes Furthermore, 6223 is able to crack all 6222 hashes which is able to crack all 6221 hashes but at...
philsmd hashcat 8 3,445 08-26-2019, 03:07 PM
    Thread: Benchmark give some results but crash in particular hashes
Post: RE: Benchmark give some results but crash in parti...

did you try to test with the hashcat beta from https://hashcat.net/beta/ ?
philsmd hashcat 4 3,461 11-18-2019, 02:20 PM
    Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)

Code: -- hashcat64.exe -m 900 -a 3 -w 3 -O -2 ?l?d hashmd4.txt ?2?2?2?2?2?2?2?2?2?2?2 --
philsmd hashcat 9 3,465 11-22-2019, 08:55 PM