Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Performance difference Win 7 vs Win 10?
Post: RE: Performance difference Win 7 vs Win 10?

I've done some more experimenting and I'm convinced there are other factors that determine speed besides the video card and hash. When I upgraded my main cracking system to the 1060 card, I took my ol...
rsberzerker hashcat 3 3,723 09-19-2017, 05:03 AM
    Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: RE: PCI-E 3.0 card in a PCI-E 2.0 mobo

Thanks for the quick reply. I guess I now know what my next VC will be.
rsberzerker Hardware 2 5,548 12-26-2014, 06:10 AM
    Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce

I'm a little late, but instead of -i you could use a file with masks instead. For the example above of 1-7, create a file with the following lines: ?a ?a?a ?a?a?a ?a?a?a?a ?a?a?a?a?a ?a?a?a?a?...
rsberzerker Old oclHashcat Support 12 19,269 02-05-2015, 03:12 PM
    Thread: No Output of Cracked Hashes
Post: RE: No Output of Cracked Hashes

Generally, the plain wordlists don't crack many, if any, passwords. But combine them with rules and you are more likely to get something. The best64 ruleset, included with oclhashcat, is a good one. J...
rsberzerker Old oclHashcat Support 10 12,485 02-09-2015, 03:26 AM
    Thread: No Output of Cracked Hashes
Post: RE: No Output of Cracked Hashes

There are several online hash generators. Try giving them a "password" and get the hash. Then be sure the password is the dictionary you are using to attack said hash. This way, you will get to see a ...
rsberzerker Old oclHashcat Support 10 12,485 02-09-2015, 05:33 AM
    Thread: Need some direction with combining dictionaries
Post: RE: Need some direction with combining dictionarie...

It can be done with oclhashcat, but it will take some work. You have two options (AFAIK): 1) Use the hashcat utility program combinator to create a new dictionary, then you can use rules with that....
rsberzerker Old oclHashcat Support 3 12,104 12-28-2014, 05:52 PM
    Thread: Need Help | SHA256
Post: RE: Need Help | SHA256

Translation of epixoip's post: Your keyspace is too large for hashcat to handle, even the 64 bit version. There's not enough memory addresses. No you can't get more until an OS and hardware are made t...
rsberzerker hashcat 5 4,896 08-14-2017, 02:37 PM
    Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption

philsmd Wrote: (08-21-2017, 08:58 AM) -- because you probably should use the collider mode 9710 (with mask ?b?b?b?b?b) for instant access to the data -- Here's a post by Atom with a more detailed e...
rsberzerker General Talk 9 15,344 08-26-2017, 07:57 AM
    Thread: Minimum password length
Post: RE: Minimum password length

Yes, a mask will work for a brute force attack to select only certain length passwords, but it doesn't work for a hybrid attack. For example, my [fake, example only] dictionary contains two words: pas...
rsberzerker Old oclHashcat Support 5 24,935 12-21-2014, 05:19 AM
    Thread: MD5 salted hashs
Post: RE: MD5 salted hashs

epixoip Wrote: (12-22-2014, 04:06 AM) -- Not sure what you're doing wrong. Maybe you have trailing whitespace or something. -- OK, partially solved. I did have some whitespace at the end of the has...
rsberzerker Old hashcat Support 4 8,165 12-22-2014, 04:48 AM
    Thread: MD5 salted hashs
Post: RE: MD5 salted hashs

That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it).
rsberzerker Old hashcat Support 4 8,165 12-22-2014, 07:18 AM
    Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR

1) What hash type are you trying to crack? 2) There are example hashes for pretty much every type in the wiki. Check ones you are getting an error with against the example. Does it look the same fo...
rsberzerker hashcat 9 7,528 09-21-2017, 02:18 PM
    Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR

Comparing your problem hashes to the example hashes, they don't match in format, which is the problem. For the 2611, you have XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:XXXXXXXXXXXXXXXXXXXXXXXXXXX wh...
rsberzerker hashcat 9 7,528 09-27-2017, 02:10 PM
    Thread: kwprocessor route help
Post: RE: kwprocessor route help

OK, thanks Atom. Combinator it is.
rsberzerker hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 2 3,167 08-28-2017, 03:12 PM
    Thread: Is my plan a good idea?
Post: RE: Is my plan a good idea?

Rainbow tables are virtually useless against salted hashes. And even if they weren't, you have to factor in disk access times: How fast can you search those tables vs. how fast is hashcat (and oclhash...
rsberzerker General Talk 23 40,648 12-28-2014, 11:28 PM
    Thread: Is it even possible?
Post: RE: Is it even possible?

Well, the character set is 26+26 = 52. Ten characters is 52^10 = 144,555,105,949,057,024 possible passwords. At 10m/sec (which is very low depending on the hash), ~458 years. BUT...10m/sec is low f...
rsberzerker Old hashcat Support 11 16,228 02-08-2015, 09:19 PM
    Thread: Is it even possible?
Post: RE: Is it even possible?

If you have the hash, you should have the salt too. Hashcat (and oclhashcat), given the right -m parameter, will automatically use the salt. You don't need to crack that.
rsberzerker Old hashcat Support 11 16,228 02-08-2015, 11:49 PM
    Thread: Is it even possible?
Post: RE: Is it even possible?

Yes. The salt is normally stored with the hash. So if you have access to the hash, you have access to the salt.
rsberzerker Old hashcat Support 11 16,228 02-10-2015, 03:10 PM
    Thread: Incrementing Brute Force Attack?
Post: RE: Incrementing Brute Force Attack?

epixoip Wrote: (01-01-2015, 07:30 AM) -- You're not going to be able to brute force past 9 characters, let alone 32. -- Epixoip is right. True brute forcing past about 8 characters is not practical...
rsberzerker Old oclHashcat Support 4 12,083 01-01-2015, 07:59 AM
    Thread: How To Run Hashcat ON RDP/VPS
Post: RE: How To Run Hashcat ON RDP/VPS

Seconded Mem5's answer. You're missing the proper video drivers. Also hashcat-cli64 is from older versions of hashcat and obsolete. Not recommended to use.
rsberzerker hashcat 4 4,625 09-26-2017, 02:51 PM