Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Run in cloud
Post: RE: Run in cloud
Your original error report describes errors with compilation, but your screenshot does not show any compilation errors but rather just shows that there is no CUDA detected. Is CUDA properly detected o... |
|
royce |
hashcat
|
6 |
1,183 |
12-28-2022, 04:24 PM |
|
|
Thread: New Hashmode 29700
Post: RE: New Hashmode 29700
29700 has been added to the example_hashes wiki page - thanks for the heads-up! Since it's the keyfile-only mode, it required a non-standard password that had to be footnoted, etc. so i can see why so... |
|
royce |
hashcat
|
5 |
1,423 |
11-28-2022, 10:38 PM |
|
|
Thread: [f]inish
Post: RE: [f]inish
Fair point - I've added this stub to the wiki, which will be expanded:
https://hashcat.net/wiki/doku.php?id=hashcat#status_output
[f]inish tells hashcat to finish after the *current* attack segment ... |
|
royce |
hashcat
|
1 |
913 |
10-22-2022, 06:01 PM |
|
|
Thread: Separator unmatched when using example hash
Post: RE: Separator unmatched when using example hash
Quoting only needs to happen on the outside of the string:
'blah$blah$blah' |
|
royce |
hashcat
|
5 |
38,566 |
10-01-2022, 08:20 PM |
|
|
Thread: How hashcat 6.2.6 load a big dictionary faster
Post: RE: How hashcat 6.2.6 load a big dictionary faster
does it do the "Dictionary cache rebuilding" every time, even if the file has not changed? |
|
royce |
hashcat
|
10 |
4,586 |
09-19-2022, 07:09 AM |
|
|
Thread: "?a" charset not exploring full keyspace (solved)
Post: RE: "?a" charset not exploring full keyspace (solv...
FWIW, your temperature abort should be well below 99, that's really much too hot. |
|
royce |
hashcat
|
8 |
3,343 |
09-09-2022, 05:09 AM |
|
|
Thread: Association Attack & potfiles
Post: RE: Association Attack & potfiles
Seems like a good idea to explicitly warn the user. Could you create a GitHub feature request for this? |
|
royce |
hashcat
|
5 |
2,273 |
09-07-2022, 09:47 PM |
|
|
Thread: Hash cracking big list of hashes
Post: RE: Hash cracking big list of hashes
jilaluxs Wrote: (08-29-2022, 08:06 PM)
--
But what about the Bitmap table overflowed message? Should I just ignore it then?
--
Just like the feedback message says, you can adjust the bitmap-max (wi... |
|
royce |
hashcat
|
5 |
3,278 |
08-31-2022, 05:51 AM |
|
|
Thread: hascat plaintext mode (99999) with weakpass_3w list
Post: RE: hascat plaintext mode (99999) with weakpass_3w...
General diagnostic step: test a simpler case - a single word, with a single word in an uncompressed wordlist. Then try compressing the wordlist and see if it still works. |
|
royce |
hashcat
|
3 |
2,531 |
06-12-2022, 12:50 AM |
|
|
Thread: Help rar5 hash
Post: RE: Help rar5 hash
arkedia, your hash has been redacted. As per forum rules, do not request cracking or post hashes in the forums. |
|
royce |
hashcat
|
5 |
4,774 |
04-23-2022, 12:42 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
https://packetstormsecurity.com/files/166712/ZSL-2022-5701.txt
"The password is generated using the last 4 values from device's MAC address which is disclosed on the main webUI login page to an una... |
|
royce |
User Contributions
|
203 |
651,708 |
04-13-2022, 09:57 PM |
|
|
Thread: Recover password from FreeArc file
Post: RE: Recover password from FreeArc file
If an algorithm exists and is easy to implement in hashcat, then if it was rare, I can see the main developers not wanting to implement it themselves. But I would want to be open to accepting good PRs... |
|
royce |
hashcat
|
4 |
8,123 |
03-14-2022, 12:41 AM |
|
|
Thread: How to crack a bcrypt hash with salt?
Post: RE: How to crack a bcrypt hash with salt?
If the salt is already in the hash, it will automatically be used, for all hash types.
If the salt is not already in the hash, you can supply it on the command line. |
|
royce |
hashcat
|
3 |
6,120 |
03-02-2022, 09:45 AM |
|
|
Thread: How to crack a bcrypt hash with salt?
Post: RE: How to crack a bcrypt hash with salt?
hashcat detects and uses the salt automatically. Simply pass the hash it on the command line (may need to single-quote the dollar signs). It's mode 3200 (unless it's a nested hash of some kind). So ha... |
|
royce |
hashcat
|
3 |
6,120 |
03-02-2022, 12:38 AM |
|
|
Thread: Solar Powered Hascat - Checkpoint
Post: RE: Solar Powered Hascat - Checkpoint
There currently isn't a way to adjust hashcat's checkpoint interval. It is automatically calculated.
Your only other option would be to divide your attack into small attacks. |
|
royce |
hashcat
|
1 |
2,912 |
11-10-2021, 06:50 AM |
|
|
Thread: help me pls
Post: RE: help me pls
Based on the output you've shown above, the attack would work, but jus be slower.
Are you getting any other errors? |
|
royce |
hashcat
|
1 |
3,003 |
11-08-2021, 08:46 AM |
|
|
Thread: Mask-Attack
Post: RE: Mask-Attack
The links you listed illustrate how to do that. It's comma-separated and order-dependent, so these are equivalent:
cmdline:
-1 ?l?u ?1?1?1
file:
?l?u,?1?1?1
... and:
cmdline:
-1 ?l?u -2 ?u?d ?1?2?... |
|
royce |
hashcat
|
8 |
10,874 |
11-08-2021, 08:45 AM |
|
|
Thread: Invalid Device id 0 Specified
Post: RE: Invalid Device id 0 Specified
Not sure if it's related, but --depricted-check-disable has a typo in it |
|
royce |
hashcat
|
4 |
6,658 |
11-08-2021, 08:42 AM |
|
|
Thread: Sha255 with custom amount of iterations.
Post: RE: Sha255 with custom amount of iterations.
hashcat has no support for arbitrary iteration. MDXfind is the main option there, but it is (currently) only CPU, not GPU. |
|
royce |
General Talk
|
1 |
2,074 |
11-03-2021, 06:17 AM |
|
|
Thread: Getting salt from known hash and pass
Post: RE: Getting salt from known hash and pass
Yep - not to self-promote too much, but I answered it here:
https://security.stackexchange.com/a/171922/6203
The key concept is that the salt is actually part of the password, so you're trying to cr... |
|
royce |
hashcat
|
1 |
3,512 |
10-16-2021, 01:57 AM |