Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

HI ZerBea, What do you mean by: Quote: -- hcxdumptool is able to prevent complete wlan traffic -- Your tool send deauth packets in order to disconnect connected users? So connected users need to con...
Mem5 User Contributions 648 487,115 08-31-2018, 10:45 AM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Hi Zerbea, From my own experience, using "hcxpcaptool (...) -I wordlist -E wordlist" and then hashcat on 'wordlist' never gave me any cracked password. I have tested that on about 1000 unique ESSID (c...
Mem5 User Contributions 648 487,115 06-08-2019, 01:01 PM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Here is my experiencce on 10'000 cap files, command line was : Code: -- hcxpcaptool -M imsilist -X clientprobelist -I wordlist -E wordlist -T trafficlist -g gpslist -U usernamelist -P pmklist --net...
Mem5 User Contributions 648 487,115 06-08-2019, 01:32 PM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Burguerman Wrote: (06-23-2019, 10:03 PM) -- I have heard thar there is a windows version of Hashcat. If so, could you post a link for downloading? -- Have you checked www.hashcat.net ?! And then "h...
Mem5 User Contributions 648 487,115 06-23-2019, 10:57 PM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Wondering if message pairs are still included, and easy to find/decode, in the new format? M2M3 or M3M4 are good evidence that the password was correct.
Mem5 User Contributions 648 487,115 01-12-2020, 12:43 AM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Format 22000 is easily readable, just explained at the top of this thread : ZerBea Wrote: (03-15-2020, 11:51 PM) -- The format of a 22000 hashline is: Code: -- SIGNATURE*TYPE*PMKID/MIC*MACAP*MAC...
Mem5 User Contributions 648 487,115 03-27-2020, 05:42 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

It just misses a field to send a pmkid hash :)
Mem5 User Contributions 187 1,293,316 08-27-2018, 07:24 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

"hashcat -m 16800 82445.16800 -a 3 -w 3 '?l?l?l?l?l?lt!' " Change the mask, or use wordlist.
Mem5 User Contributions 187 1,293,316 09-21-2018, 09:39 AM
    Thread: oclHashcat v1.20
Post: RE: oclHashcat v1.20

Awesome work. Thanks :)
Mem5 Old oclHashcat Announcements 44 160,910 04-27-2014, 03:12 PM
    Thread: Need help with Intel CPU and NVIDIA GPU
Post: RE: Need help with Intel CPU and NVIDIA GPU

Which OS ? Which GPU ? CUDA or OpenCL ? This is a good start : https://www.google.com/search?q=nvidia+driver
Mem5 hashcat 43 4,380 07-29-2020, 12:10 PM
    Thread: Need help with Intel CPU and NVIDIA GPU
Post: RE: Got it running, kind of

FPTHHrw6mKhNZwL6 Wrote: (07-30-2020, 04:19 PM) -- ./hashcat.bin -a 3 -m 1400 Guess.hash -1 123456789 -2 0123456789- -3 abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789- -4 abcdefghijklm...
Mem5 hashcat 43 4,380 07-30-2020, 06:04 PM
    Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...

Awesome ! Thank you ! Does it also work for Excel, PowerPoint 97-2003 password protected document ? Or only Word ?
Mem5 User Contributions 36 134,711 09-09-2014, 08:19 AM
    Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...

Can't wait to test it !
Mem5 User Contributions 36 134,711 09-11-2014, 08:48 PM
    Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...

A question : why do we need to provide the mask (?b?b?b?b?b here) ? A collision does not need that for example the collider of mysql323 of tobtu. Thanks
Mem5 User Contributions 36 134,711 10-30-2014, 09:43 PM
    Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC

To reduce a bit your list, you can look for all hashes which ends with Code: -- *AAD3B435B51404EE -- It is obviously a LM hash, and the plain text is only < 7 (the second part is the null password)
Mem5 Feature Requests 31 77,589 08-28-2011, 12:21 PM
    Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC

atom, do you have any news about the crack of LM hashes in hashat or oclhashcat ? For future releases ? Thanks
Mem5 Feature Requests 31 77,589 01-01-2012, 02:32 PM
    Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC

Many thanks!
Mem5 Feature Requests 31 77,589 02-02-2012, 11:56 PM
    Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC

atom do you plan an update for LM for hashcat (cpu) ?
Mem5 Feature Requests 31 77,589 02-05-2012, 09:11 PM
    Thread: Dictiionary Attack - how-to-question
Post: RE: Dictiionary Attack - how-to-question

You don't need -a 0 (optional) Why -d 2 ? if you have several GPUs it's better to run hashcat on all GPUs (what you don't do here)
Mem5 General Talk 29 5,280 04-17-2020, 06:15 PM
    Thread: How to bruteforce?
Post: RE: How to bruteforce?

Quote: -- For example: the new T0XlC.rule set is really cool, try it on rockyou.txt or any other good dictionaries. -- Please where can I find this t0xic.rule file ? Thanks.
Mem5 Very old oclHashcat-plus Support 24 63,011 01-06-2012, 06:08 PM