Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: how to crack a windows 10 local user password hash(Netnlm capture)
Post: RE: how to crack a windows 10 local user password ...

Replace Code: -- -i 5:15 -- by the correct syntax [spoil]-i --increment-min 5 ---increment-max 15[/spoil] You can remove --i if you do not need to increment.
Mem5 hashcat 14 4,707 08-13-2019, 09:45 AM
    Thread: "bug!!" in output / ocl v1.36
Post: "bug!!" in output / ocl v1.36

Hello, Fresh install of Windwos 8.1, Catalyst 14.9, on Radeon R9 290 Apparently (?) same bug as https://hashcat.net/trac/ticket/593 Running oclhashcat 1.36, cmdline : Code: -- oclHashcat64.exe ...
Mem5 Old oclHashcat Support 13 17,472 07-25-2015, 11:46 AM
    Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36

Same error (randomly) with this command line (wpa) : oclHashcat-1.36\oclHashcat64.exe --remove --gpu-temp-abort=90 -w 3 -m 2500 -o res.txt aaa.hccap *.dic
Mem5 Old oclHashcat Support 13 17,472 07-26-2015, 09:09 PM
    Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36

Please note that version 1.35 gives much less error "bug!!" than 1.36. I hope it will help you !
Mem5 Old oclHashcat Support 13 17,472 07-28-2015, 11:08 PM
    Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36

v1.37 also gives me, randomly, the "bug!!" output. Do you have any ideas of the problem ?
Mem5 Old oclHashcat Support 13 17,472 08-23-2015, 10:40 AM
    Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36

Hum, I found where it may comes from : one of my wordlist. A word inside certainly causes ocl v1.37 an lower to crash (prints bug!!) Any idea how to spot it ? I used ULM to clean it : purge unicode c...
Mem5 Old oclHashcat Support 13 17,472 08-23-2015, 11:14 AM
    Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36

Sent to PM.
Mem5 Old oclHashcat Support 13 17,472 08-23-2015, 01:12 PM
    Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36

Tested with : v1.31 : OK v1.32 : OK v1.33 : bug v1.34 : bug v1.35 : bug v1.36 : bug v1.37 : bug
Mem5 Old oclHashcat Support 13 17,472 08-23-2015, 01:21 PM
    Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36

@atom Thanks for trying. Sadly so hard to reproduce :( Finally v1.32 also gives me "bug!!". So, only the v1.31 _never_ gave me that bug. - Maybe you could check what's changed between v1.31 and v1....
Mem5 Old oclHashcat Support 13 17,472 08-24-2015, 09:45 PM
    Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?

It means : Code: -- hashcat64.exe -m 2500 -1 ?d?u?l davehash.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1 -- Hint: I don't know your graphic card but it will last some months ;-)
Mem5 hashcat 13 12,975 06-19-2017, 10:48 PM
    Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?

Your problem is not about the lenght of mask, but "Time.Estimated...: Thu Aug 20 05:19:43 2020 (46696 years, 52 days)" Cracking WPA is slow. If you ask for 12 chars (lower-upper-digits) it will take ...
Mem5 hashcat 13 12,975 06-20-2017, 10:24 AM
    Thread: Old Office and KDF
Post: Old Office and KDF

Hello, I am trying to crack an old-office hash following the steps given at https://hashcat.net/forum/thread-3665-post-20935.html#pid20935 : Thanks to mode 9710 I found : 'deebd8f416' as ou...
Mem5 hashcat 13 10,123 01-19-2018, 08:15 PM
    Thread: Old Office and KDF
Post: RE: Old Office and KDF

I don't know what to do with the last MD5 I've computed.
Mem5 hashcat 13 10,123 01-20-2018, 12:43 AM
    Thread: Old Office and KDF
Post: RE: Old Office and KDF

All. I don't see where hashcat can help me to do these steps, so I guess I need to code in python or C++ to deal with RC4 decryption and encryptedVerifier? If yes, are you aware of an existing code t...
Mem5 hashcat 13 10,123 01-20-2018, 12:34 PM
    Thread: Old Office and KDF
Post: RE: Old Office and KDF

Hum, I'm confused as philsmd wrote: philsmd Wrote: (09-12-2017, 05:00 PM) -- If you read this carefully https://hashcat.net/forum/thread-3665.html, you will see that you only need -m 9710 to acces...
Mem5 hashcat 13 10,123 01-23-2018, 11:59 AM
    Thread: Old Office and KDF
Post: RE: Old Office and KDF

atom Wrote: (01-24-2018, 11:02 AM) -- Just use -m 9700 then and crack as normal -- Do you mean bruteforce or wordlist attack ? But if the password is more than 30 characters I won't be able to re...
Mem5 hashcat 13 10,123 01-25-2018, 10:58 PM
    Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0

Awesome as usual, thanks!
Mem5 hashcat 13 32,462 02-22-2018, 12:02 AM
    Thread: Old Office and KDF
Post: RE: Old Office and KDF

Thanks atom. I use this cmdline: hashcat64 -m 9800 -a 3 -w 4 -O office.hash ?a?a?a?a?a?a?a?a?a After 30 hours (on 2x1080), nothing cracked so far. Wha do you mean by "pretty soon" ? :D
Mem5 hashcat 13 10,123 02-25-2018, 11:32 AM
    Thread: Old Office and KDF
Post: RE: Old Office and KDF

Same behaviour with 9700 by the way. I've tried both.
Mem5 hashcat 13 10,123 02-25-2018, 02:52 PM
    Thread: Ransomware
Post: RE: Ransomware

We may better help you if we know the encryption algorithm used by the ransoware?
Mem5 hashcat 13 7,567 12-13-2018, 07:56 PM