Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: hashcat v6.2.0
Post: RE: hashcat v6.2.0

mind blowing, awesome!
hblender hashcat 41 73,274 05-16-2021, 11:09 PM
    Thread: Bruteforcing VeraCrypt drive while knowing password pattern
Post: RE: Bruteforcing VeraCrypt drive while knowing pas...

Of course! In Windows, aswell as in Linux it is possible to input two (or more) commands so that the fisrt one sends data to the second one and therefore the second one is reading whatever the first o...
hblender hashcat 4 3,847 05-10-2021, 08:43 AM
    Thread: Bruteforcing VeraCrypt drive while knowing password pattern
Post: RE: Bruteforcing VeraCrypt drive while knowing pas...

since the mayority of veracrypt modes are somewhat slow, i suggest you using maskprocessor because it can generate candidates rejecting (almost*) the ones cotaining duplicated symbols and characters. ...
hblender hashcat 4 3,847 04-26-2021, 04:42 PM
    Thread: Step by step guide for a noob?
Post: RE: Step by step guide for a noob?

There is nothing much you can do it such case. The keyspace you are trying to use makes the cracking not feasible, this means that to complete or to exhaust all the possible candidates you will need a...
hblender hashcat 14 11,318 03-21-2021, 07:59 PM
    Thread: Step by step guide for a noob?
Post: RE: Step by step guide for a noob?

Conir Wrote: (03-20-2021, 11:52 PM) -- Also the hash.txt file that has been created is showing as chinese characters (I've noticed it mentioned before) is it supposed to be like that or do i need to ...
hblender hashcat 14 11,318 03-21-2021, 11:09 AM
    Thread: Step by step guide for a noob?
Post: RE: Step by step guide for a noob?

Okay, then i think it will look something like this: Code: -- dd if=a.raw of=b.vc bs=1 count=512 -- where, a.raw is the veracrypt volume and b.vc is the file that you will be using with hashcat ...
hblender hashcat 14 11,318 03-20-2021, 06:55 PM
    Thread: Step by step guide for a noob?
Post: RE: Step by step guide for a noob?

Try to follow this explanation: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_hashes_from_truecrypt_volumes Below that section it says: "The procedure to ext...
hblender hashcat 14 11,318 03-20-2021, 06:31 PM
    Thread: Hardware monitoring interface not found on your system?
Post: RE: Hardware monitoring interface not found on you...

Try adding --hwmon-disable at the end of the command.
hblender hashcat 4 7,264 03-20-2021, 06:17 PM
    Thread: Veracrypt boot volume - decryption possible? Parts of pw known
Post: RE: Veracrypt boot volume - decryption possible? P...

So, what is encrypted is just the boot volume or the boot volume plus the whole OS including all your files?
hblender hashcat 3 3,591 02-16-2021, 04:45 PM
    Thread: hashcat-4.0.1 mask
Post: RE: hashcat-4.0.1 mask

use rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack or write your own script the increment parameter is useless if you specify the custom charset, also there is no need to put all the...
hblender hashcat 3 3,318 01-26-2021, 02:57 PM
    Thread: Nvidia 2060 Super Benchmark
Post: RE: Nvidia 2060 Super Benchmark

Quote: -- Hello, could you provide an update benchmark with the hash 22000 and Hashcat V6? would be insteresting for compare with other cards. Thanks. -- Hash 22000 and 2500 "almost" hav...
hblender Hardware 3 9,766 01-14-2021, 11:56 PM
    Thread: Blockchain.com hash
Post: RE: Blockchain.com hash

Check out https://hashcat.net/wiki/doku.php?id=example_hashes And compare your hash format with the one that is on that page (https://hashcat.net/wiki/doku.php?id=example_hashes).
hblender hashcat 4 4,272 01-14-2021, 11:44 PM
    Thread: Maskprocessor CPU Usage
Post: RE: Maskprocessor CPU Usage

Try combining crunch with hashcat's reject rules.
hblender hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 2,498 01-14-2021, 04:37 PM
    Thread: request Hashrates. Nvidia 2060 Super.
Post: RE: rquest Hashrates. Nvidia 2060 Super.

Here: https://hashcat.net/forum/thread-8542.html (notice this guy has 3 of them).
hblender Hardware 3 3,322 01-14-2021, 04:32 PM
    Thread: Resume Pipe
Post: RE: Resume Pipe

It depends on the generator, some of them support resuming form an X word.
hblender hashcat 1 2,210 01-08-2021, 01:35 AM
    Thread: Understanding Mask
Post: RE: Understanding Mask

To perform said attack you need to use this mask -1 ?l?s?d ?1?1?1?1?1?1?1?1 and then the increment mode... -i --increment-min=7 --increment-max=8 resulting in this a command that would look like this:...
hblender hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 2 3,315 01-08-2021, 01:09 AM
    Thread: Apple M1 and myetherwallet recovery
Post: RE: Apple M1 and myetherwallet recovery

Same here, my 1660 Super does 3H/s... Maybe if you have used an intel cpu you could obtain better results than with your ryzen. Apparently, many slow hashes are significantly faster with CPUS rather...
hblender Hardware 4 9,193 01-07-2021, 06:35 PM
    Thread: Using mask processor with a specific twist
Post: RE: Using mask processor with a specific twist

It is impossible to do it with the mask processor. Give a try to the wonderful reject rules https://hashcat.net/wiki/doku.php?id=rule_based_attack . Start with the rule named "Reject not contain" whic...
hblender hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 2,323 01-07-2021, 06:00 PM
    Thread: mask processor complexity and hashcat
Post: RE: mask processor complexity and hashcat

By saying "password is NOT computer generated" and "generate 2 word lists (one with only letters and...)" do you mean that the first 7 characters are normal and human words or just random letters?
hblender hashcat 3 3,388 01-05-2021, 11:51 PM
    Thread: multiple characters in generated password
Post: RE: multiple characters in generated password

GOT IT! Try using the maskprocessor. You will need to use the -q option: "Maximum number of multiple sequential characters" here's the link: https://github.com/hashcat/maskprocessor
hblender General Talk 2 3,032 12-27-2020, 10:11 PM