Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: rocktastic -> PACK
Post: RE: rocktastic -> PACK

Do you have any statistics on well-known hashlist? Huge wordlists are not always the best for slow hashes.
Mem5 User Contributions 2 1,626 01-22-2020, 12:03 PM
    Thread: Rule file (very common 'complex' passwords)
Post: RE: Rule file (very common 'complex' passwords)

? too
Mem5 User Contributions 6 14,855 01-29-2014, 09:24 PM
    Thread: Rules attack - restore not working
Post: RE: Rules attack - restore not working

which algorithm? command line?
Mem5 hashcat 8 1,537 04-17-2020, 06:16 PM
    Thread: Rules test
Post: RE: Rules test

--stdout is your friend: Code: -- > echo kevin | hashcat64 --stdout -j "c" Kevin > echo kevin | hashcat64 --stdout -r best64.txt kevin1 ... --
Mem5 General Talk 2 2,318 11-05-2018, 08:22 PM
    Thread: Running hashcat on multiple hash files
Post: RE: Running hashcat on multiple hash files

Have you tried to cat them all in one file?
Mem5 General Talk 5 3,007 10-23-2019, 09:26 PM
    Thread: Running hashcat on multiple hash files
Post: RE: Running hashcat on multiple hash files

slawson Wrote: (10-23-2019, 09:40 PM) -- copy /b *.16800 all.16800 -- Pay attention, /B          Indicates a binary file While 16800 mode is text only.
Mem5 General Talk 5 3,007 10-29-2019, 09:06 AM
    Thread: Sappphire Radeon R9 290 TRI-X benchmark
Post: RE: Sappphire Radeon R9 290 TRI-X benchmark

It is also very silent. 6990 is amazingly noisy.
Mem5 Hardware 2 7,805 06-29-2014, 12:39 PM
    Thread: Seemingly no-crack attemps
Post: RE: Seemingly no-crack attemps

it does do something : Quote: -- Progress..: 1/1 (100.00%) -- It only tries one password. Clue : "Input.Mode: Mask (mas)"
Mem5 Old hashcat Support 2 6,105 11-19-2012, 09:57 PM
    Thread: Session issue
Post: RE: Session issue

I've just checked, I left the progress at 0.16%, I launch the restore, it begun at 0.00%.
Mem5 Very old oclHashcat-plus Support 12 18,653 10-14-2013, 07:50 AM
    Thread: Session issue
Post: RE: Session issue

Any idea ?
Mem5 Very old oclHashcat-plus Support 12 18,653 10-14-2013, 08:23 PM
    Thread: Session issue
Post: RE: Session issue

OK. But why is it working with you ?
Mem5 Very old oclHashcat-plus Support 12 18,653 10-15-2013, 07:20 AM
    Thread: Session issue
Post: RE: Session issue

I understand. So the switch "--restore-timer=NUM Save restore file each NUM seconds" is not properly what it means ?
Mem5 Very old oclHashcat-plus Support 12 18,653 10-15-2013, 11:03 PM
    Thread: Session issue
Post: RE: Session issue

atom is right :) I let the first command run during 1 hour (progress : 2%) Then I restore it : started at 2%/1 hour. Cool :)
Mem5 Very old oclHashcat-plus Support 12 18,653 10-16-2013, 07:39 AM
    Thread: SHA-256 64 char password
Post: RE: SHA-256 64 char password

Why are you sure it's 64 chars? You generated it?
Mem5 hashcat 2 574 05-26-2020, 11:14 PM
    Thread: SHA-512 in cudahashcat
Post: RE: SHA-512 in cudahashcat

Nice atom thank you. Any date for the next release ? Ok Rolf I'll see!
Mem5 Feature Requests 7 18,774 03-18-2012, 05:26 PM
    Thread: SHA1 bad result
Post: RE: SHA1 bad result

I'll PM you.
Mem5 Very old oclHashcat-plus Support 3 7,548 01-21-2012, 12:18 PM
    Thread: SHA1 underscore salted ?
Post: RE: SHA1 underscore salted ?

Oh yes, thank you. For my curiosity, if the salt ends with ':', it's the same format ? Code: -- hash:salt: --
Mem5 General Help 9 15,119 02-27-2013, 09:10 AM
    Thread: SHA1 underscore salted ?
Post: RE: SHA1 underscore salted ?

I mean the username is "MyUsername:" I create a hashfile : Code: -- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:MyUsername: -- Should it work with -m 120 ?
Mem5 General Help 9 15,119 02-28-2013, 09:20 AM
    Thread: SHA1 underscore salted ?
Post: RE: SHA1 underscore salted ?

Nice, thank you. It worked well :)
Mem5 General Help 9 15,119 03-02-2013, 11:04 AM
    Thread: SHA256
Post: RE: SHA256

You missed the bruteforce part: hashcat64.exe -m 1400 -a 3 -i --increment-min=1 --increment-max=64 -o result.txt -1 ?d?l hashes.txt ?1*64 times -1 ?d?l means digits + loweralpha ?1*64 times means ...
Mem5 hashcat 1 945 02-29-2020, 02:59 PM