Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion

@pragmatic: Well done with the description :) The reason why WPA2 handshakes are so slow is due to the computationally intensive task of calculating the PMK. If I remember correct, per the speci...
NeonFlash General Talk 11 51,112 11-14-2012, 05:48 AM
    Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion

You could post supporting benchmarks as well :) It should be faster than an attack without precomputed PMKs but slower than a rainbow table attack on unsalted hashes like MD5.
NeonFlash General Talk 11 51,112 11-14-2012, 07:47 AM
    Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion

Thank you for confirming with the benchmark results.
NeonFlash General Talk 11 51,112 11-14-2012, 10:47 AM
    Thread: Large IPB list issue
Post: RE: Large IPB list issue

@M@LIK: How did you fix the issue? I face the same problem while cracking a large list of IPB hashes with oclhashcat-plus. Dictionary attack runs ok, but with rules, I get wrong statistics when I pr...
NeonFlash Very old oclHashcat-plus Support 15 38,222 06-28-2012, 09:37 AM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Hello, I face the same issue as well with VBulletin and IPB hashes. I have the plaintexts for the hashes I am trying to crack with oclhashcat-plus v0.081 and even then it does not show the resul...
NeonFlash Very old oclHashcat-plus Support 13 30,288 05-21-2012, 12:15 PM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

@hashfixer: I tried a dictionary attack on multi VB hashes and multi IPB hashes. Both were successful. However, I am interested to know if the hybrid attacks and the combined dictionary attacks worke...
NeonFlash Very old oclHashcat-plus Support 13 30,288 06-28-2012, 09:40 AM
    Thread: Restore File Questions
Post: Restore File Questions

hi, I have a few questions about the recent feature added in oclHashcat-plus, the restore session feature. 1. If I start an attack with a session name "MD5" like this: oclhashcat-plus32.exe -...
NeonFlash Very old oclHashcat-plus Support 5 25,157 02-17-2013, 04:38 AM
    Thread: Segmentation fault (core dump) on --show and --left
Post: RE: Segmentation fault (core dump) on --show and -...

Interesting thread. I would like to hear the details as well. By the way, after the crash occurs, maybe you can check the dmesg output and check the last few lines with tail command? If the crash is...
NeonFlash Very old oclHashcat-plus Support 11 24,110 10-14-2012, 07:46 PM
    Thread: Cracking Russian Passwords
Post: Cracking Russian Passwords

I am not sure how the unicode support works but this is weird. MD5 Hash: 714d5bc5daad4412e118d1bfd0c7477b plaintext: ьфдщн I noticed this on one of the hash cracked list on a ...
NeonFlash Very old oclHashcat-plus Support 11 23,629 05-23-2012, 08:31 PM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

Thanks for the replies :) A few points worth noting. Check the MD5 Hash of ьфдщн on the following 2 sites: https://md5-hash-online.waraxe.us/ https://www.miraclesalad.com/webtools/md5...
NeonFlash Very old oclHashcat-plus Support 11 23,629 05-24-2012, 04:33 AM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

Can somebody try what I suggested above and post their results?
NeonFlash Very old oclHashcat-plus Support 11 23,629 05-25-2012, 08:37 PM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

Thank you, M@LIK. Can you please post the output of oclhashcat-plus session while cracking this password like I did in my post? Yes, my dictionary file is UTF-8 Encoded. I am cracking it on W...
NeonFlash Very old oclHashcat-plus Support 11 23,629 05-26-2012, 05:21 AM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

Thank you again. I am looking into this. So, as I understand, oclhashcat-plus is not BOM aware. I believe it could be made? For instance, if you encounter the bytes (EF BB FF) in the stream then ig...
NeonFlash Very old oclHashcat-plus Support 11 23,629 05-26-2012, 06:16 AM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

Thanks M@LIK :) [hr] Notepad++ will do this too. Encoding -> Convert to UTF-8 without BOM
NeonFlash Very old oclHashcat-plus Support 11 23,629 05-26-2012, 08:58 AM
    Thread: IPB Multi Hash list issue with ATI Radeon 5xxx and 6xxx
Post: IPB Multi Hash list issue with ATI Radeon 5xxx and...

AMD has this site available where you can report issues with sufficient information so that they can reproduce the issue at their end. https://www.amdsurveys.com/se.ashx?s=5A1E27D20B2F3EAC I woul...
NeonFlash Very old oclHashcat-plus Support 4 22,656 06-28-2012, 10:04 AM
    Thread: IPB Multi Hash list issue with ATI Radeon 5xxx and 6xxx
Post: RE: IPB Multi Hash list issue with ATI Radeon 5xxx...

little hashcracking utility? lol, they should do a Google Search about this software and analyze the statistics first. Anyway, this is sad to know about their support. However, oclhashcat-plus is a...
NeonFlash Very old oclHashcat-plus Support 4 22,656 06-28-2012, 10:09 AM
    Thread: IPB Multi Hash list issue with ATI Radeon 5xxx and 6xxx
Post: RE: IPB Multi Hash list issue with ATI Radeon 5xxx...

Yes, they will start giving more importance to your "little hashcracking utility" once they know that the highest end GPUs are being purchased not by the regular PC Gamers but by the hash crackers :)
NeonFlash Very old oclHashcat-plus Support 4 22,656 06-28-2012, 12:45 PM
    Thread: Slow speed values for DEScrypt crack
Post: RE: Slow speed values for DEScrypt crack

descrypt hashes are slow. even with OMP on a quad core processor, you will get around 30M c/s at max. Expect the same from a Good GPU. ATI HD 7970 should give you a better speed like around 83 Mhash...
NeonFlash Very old oclHashcat-lite Support 7 16,574 07-31-2012, 03:34 AM
    Thread: no faster WPA2 cracking?
Post: RE: no faster WPA2 cracking?

has this weakness in SHA-1 algorithm been used to revise the kernels for various SHA1 based algorithms in the latest version of oclhashcat-plus? I think a lot of algorithms which are supported by ocl...
NeonFlash General Talk 7 16,154 01-06-2013, 03:47 PM
    Thread: no faster WPA2 cracking?
Post: RE: no faster WPA2 cracking?

@undeath: My question was whether the latest version of oclhashcat-plus exploits the weakness in SHA-1 which was not mentioned in atom's post in this thread, if that's what you are referring to. @ato...
NeonFlash General Talk 7 16,154 01-06-2013, 04:03 PM