Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author [asc] Forum Replies Views Posted
    Thread: Command structure?
Post: RE: Command structure?

It's possible. You may have to quote the path if contains spaces and leave off the trailing backslash. Here's an example where C:\Users\username\Documents\wordlists is a directory containing multiple ...
rsberzerker hashcat 2 3,419 09-21-2017, 02:11 PM
    Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR

1) What hash type are you trying to crack? 2) There are example hashes for pretty much every type in the wiki. Check ones you are getting an error with against the example. Does it look the same fo...
rsberzerker hashcat 9 7,529 09-21-2017, 02:18 PM
    Thread: Minimum password length
Post: Minimum password length

I know with hashcat I can specify a minimum password length, but I can't seem to find a similar option with oclhashcat. I'm working on a hybrid attack, and I've already brute forced everything with 7 ...
rsberzerker Old oclHashcat Support 5 24,937 12-21-2014, 03:26 AM
    Thread: Minimum password length
Post: RE: Minimum password length

Yes, a mask will work for a brute force attack to select only certain length passwords, but it doesn't work for a hybrid attack. For example, my [fake, example only] dictionary contains two words: pas...
rsberzerker Old oclHashcat Support 5 24,937 12-21-2014, 05:19 AM
    Thread: MD5 salted hashs
Post: MD5 salted hashs

I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5:salt hash elsewhere and put that, along with t...
rsberzerker Old hashcat Support 4 8,165 12-22-2014, 03:46 AM
    Thread: MD5 salted hashs
Post: RE: MD5 salted hashs

epixoip Wrote: (12-22-2014, 04:06 AM) -- Not sure what you're doing wrong. Maybe you have trailing whitespace or something. -- OK, partially solved. I did have some whitespace at the end of the has...
rsberzerker Old hashcat Support 4 8,165 12-22-2014, 04:48 AM
    Thread: MD5 salted hashs
Post: RE: MD5 salted hashs

That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it).
rsberzerker Old hashcat Support 4 8,165 12-22-2014, 07:18 AM
    Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: PCI-E 3.0 card in a PCI-E 2.0 mobo

My current motherboard has only a PCI-E 2.0 x16 slot. I'm more of a casual hashcracker, but want to upgrade my video card. I've looked around, and based on several parameters, I've found a nice one. B...
rsberzerker Hardware 2 5,548 12-26-2014, 05:50 AM
    Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...

Great tutorial. It would be better IMHO if you included two things: 1) A general explanation of what the princeprocessor is actually doing. 2) The equivalent named pipe for Windows. Quote: -- .....
rsberzerker hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 22 74,888 12-26-2014, 05:54 AM
    Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: RE: PCI-E 3.0 card in a PCI-E 2.0 mobo

Thanks for the quick reply. I guess I now know what my next VC will be.
rsberzerker Hardware 2 5,548 12-26-2014, 06:10 AM
    Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...

atom Wrote: (12-26-2014, 01:14 PM) -- It's described here https://hashcat.net/tools/princeprocessor/prince-attack.pdf -- No quite as much detail as I hoped for, but more than I can [currently] under...
rsberzerker hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 22 74,888 12-27-2014, 06:03 AM
    Thread: save md5 generated hashes to the file ?
Post: RE: save md5 generated hashes to the file ?

undeath Wrote: (12-26-2014, 12:29 PM) -- No. If you want to waste your space with rainbow tables go to freerainbowtables.com. -- To add an example, ophcrack has a paid NTLM rainbow table of all pos...
rsberzerker Old oclHashcat Support 2 5,356 12-27-2014, 07:38 AM
    Thread: Need some direction with combining dictionaries
Post: RE: Need some direction with combining dictionarie...

It can be done with oclhashcat, but it will take some work. You have two options (AFAIK): 1) Use the hashcat utility program combinator to create a new dictionary, then you can use rules with that....
rsberzerker Old oclHashcat Support 3 12,104 12-28-2014, 05:52 PM
    Thread: Is my plan a good idea?
Post: RE: Is my plan a good idea?

Rainbow tables are virtually useless against salted hashes. And even if they weren't, you have to factor in disk access times: How fast can you search those tables vs. how fast is hashcat (and oclhash...
rsberzerker General Talk 23 40,649 12-28-2014, 11:28 PM
    Thread: Wordlists (Tips and Tricks)
Post: Wordlists (Tips and Tricks)

In another thread, epixoip posted this quote: Quote: -- ...And remember, quality over quantity. Most wordlists you download from the Internet are going to be pure garbage... -- This started a few ...
rsberzerker General Talk 6 18,726 12-30-2014, 06:35 AM
    Thread: Wordlists (Tips and Tricks)
Post: RE: Wordlists (Tips and Tricks)

epixoip Wrote: (12-30-2014, 07:01 AM) -- The context was around generating an hcstat file. Duplicates in your wordlist makes no sense. -- That's what I thought. Just wanted to be sure I wasn't miss...
rsberzerker General Talk 6 18,726 12-30-2014, 07:35 AM
    Thread: Wordlists (Tips and Tricks)
Post: RE: Wordlists (Tips and Tricks)

Saint Wrote: (12-30-2014, 01:41 PM) -- I have made myself a ~800mb wordlist of all real passwords. It's a very nice addition to the hashes.org one which also contains only real passwords. If you want...
rsberzerker General Talk 6 18,726 12-31-2014, 03:06 AM
    Thread: Incrementing Brute Force Attack?
Post: RE: Incrementing Brute Force Attack?

epixoip Wrote: (01-01-2015, 07:30 AM) -- You're not going to be able to brute force past 9 characters, let alone 32. -- Epixoip is right. True brute forcing past about 8 characters is not practical...
rsberzerker Old oclHashcat Support 4 12,083 01-01-2015, 07:59 AM
    Thread: HashKiller - DDoS Problem
Post: RE: HashKiller - DDoS Problem

blandyuk Wrote: (01-03-2015, 03:42 PM) -- OK, presume some of your have noticed www.hashkiller.co.uk and the forums are off-line right now. Reason is a DDoS against my IPs so I'm off until further no...
rsberzerker General Talk 7 16,521 01-03-2015, 05:05 PM
    Thread: How can I extract rules from wordlists?
Post: RE: How can I extract rules from wordlists?

PACK (https://www.thesprawl.org/projects/pack/) has some tools that supposedly can do this. Only used it for mask generation (works great), but it can do rules.
rsberzerker General Talk 7 12,216 01-04-2015, 05:56 AM