<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - All Forums]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Mon, 04 May 2026 06:58:52 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Could use help opening my old RAR]]></title>
			<link>https://hashcat.net/forum/thread-13604.html</link>
			<pubDate>Fri, 01 May 2026 11:19:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21128">Ubrobeer</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13604.html</guid>
			<description><![CDATA[While retrieving my old photo albums, I stumbled on a 1.56 GB RAR where me older photos are in. <br />
I am trying to crack the following Hash. <br />
<br />
&#36;RAR3&#36;*0*403707ca55b32e2c*9c5a6830c592342a454c9156382e4b75<br />
<br />
I did a run with a Rockyou list and a rockyou 30.000. Im a bit lost what is next. <br />
<br />
Im from the netherlands and i must have been 16-17 while i made this rar many years ago.<br />
Is there a good Dutch Rockyou list available or somebody with power that can help me?]]></description>
			<content:encoded><![CDATA[While retrieving my old photo albums, I stumbled on a 1.56 GB RAR where me older photos are in. <br />
I am trying to crack the following Hash. <br />
<br />
&#36;RAR3&#36;*0*403707ca55b32e2c*9c5a6830c592342a454c9156382e4b75<br />
<br />
I did a run with a Rockyou list and a rockyou 30.000. Im a bit lost what is next. <br />
<br />
Im from the netherlands and i must have been 16-17 while i made this rar many years ago.<br />
Is there a good Dutch Rockyou list available or somebody with power that can help me?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Need help to open locked pdf]]></title>
			<link>https://hashcat.net/forum/thread-13603.html</link>
			<pubDate>Fri, 01 May 2026 06:22:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21127">Dim</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13603.html</guid>
			<description><![CDATA[Need help to open locked pdf<br />
Forgot Password]]></description>
			<content:encoded><![CDATA[Need help to open locked pdf<br />
Forgot Password]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I'd like to open my password-protected zip file]]></title>
			<link>https://hashcat.net/forum/thread-13602.html</link>
			<pubDate>Thu, 30 Apr 2026 02:37:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21124">dimple</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13602.html</guid>
			<description><![CDATA[Hello everyone.<br />
I locked my zip password one year ago. And I am in need to open it now.<br />
But I can't remeber password of zip file. I should open that zip file for sure.<br />
Regarding my friend's words, hashcat would be helpful for me to crack my zip file.<br />
<br />
I just wanna get help even from admin, experts, but from legit, verified memebers<br />
<br />
Looking forward to your guys's help<br />
<br />
Best]]></description>
			<content:encoded><![CDATA[Hello everyone.<br />
I locked my zip password one year ago. And I am in need to open it now.<br />
But I can't remeber password of zip file. I should open that zip file for sure.<br />
Regarding my friend's words, hashcat would be helpful for me to crack my zip file.<br />
<br />
I just wanna get help even from admin, experts, but from legit, verified memebers<br />
<br />
Looking forward to your guys's help<br />
<br />
Best]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[1 Year Trying to Crack My 2013 Bitcoin Wallet — Need Expert Advice]]></title>
			<link>https://hashcat.net/forum/thread-13600.html</link>
			<pubDate>Wed, 29 Apr 2026 05:06:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21118">hsc_learner</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13600.html</guid>
			<description><![CDATA[<span style="color: #000000;" class="mycode_color">Hey everyone,</span><br />
<span style="color: #000000;" class="mycode_color"><br />
I’m looking for some guidance from those with experience in password recovery/cracking.<br />
For nearly a year, I’ve been trying to recover access to an old Bitcoin wallet (wallet.dat from 2013). I extracted the hash and have been attempting to crack it using an RTX 3060, but haven’t had any success so far.<br />
Recently, I discovered Vast.ai and was able to run jobs on more powerful GPUs (including an RTX 5090). I was hopeful this would make a difference, but unfortunately, I still haven’t had any luck.<br />
</span><br />
<span style="color: #000000;" class="mycode_color">So far, I’ve tried:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">Variations of old passwords I may have used</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Brute force with numeric ranges (0–10 digits)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Short brute-force masks (1–5 characters, all character sets)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Large wordlists (including weakpass and similar sources)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">At this point, I’m considering expanding brute-force attempts to longer character lengths, but I’m concerned about cost vs. benefit.<br />
I’d really appreciate advice on:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">The most efficient GPU(s) for this type of workload</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Cost-effective strategies (especially when using rented compute like Vast.ai)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Smarter approaches beyond pure brute force (mask strategies, rule-based attacks, etc.)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">Any tips or insights would be greatly appreciated.</span><br />
<span style="color: #000000;" class="mycode_color"><br />
Thanks in advance!<br />
</span>]]></description>
			<content:encoded><![CDATA[<span style="color: #000000;" class="mycode_color">Hey everyone,</span><br />
<span style="color: #000000;" class="mycode_color"><br />
I’m looking for some guidance from those with experience in password recovery/cracking.<br />
For nearly a year, I’ve been trying to recover access to an old Bitcoin wallet (wallet.dat from 2013). I extracted the hash and have been attempting to crack it using an RTX 3060, but haven’t had any success so far.<br />
Recently, I discovered Vast.ai and was able to run jobs on more powerful GPUs (including an RTX 5090). I was hopeful this would make a difference, but unfortunately, I still haven’t had any luck.<br />
</span><br />
<span style="color: #000000;" class="mycode_color">So far, I’ve tried:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">Variations of old passwords I may have used</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Brute force with numeric ranges (0–10 digits)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Short brute-force masks (1–5 characters, all character sets)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Large wordlists (including weakpass and similar sources)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">At this point, I’m considering expanding brute-force attempts to longer character lengths, but I’m concerned about cost vs. benefit.<br />
I’d really appreciate advice on:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">The most efficient GPU(s) for this type of workload</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Cost-effective strategies (especially when using rented compute like Vast.ai)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Smarter approaches beyond pure brute force (mask strategies, rule-based attacks, etc.)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">Any tips or insights would be greatly appreciated.</span><br />
<span style="color: #000000;" class="mycode_color"><br />
Thanks in advance!<br />
</span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Password Length Limitation?]]></title>
			<link>https://hashcat.net/forum/thread-13594.html</link>
			<pubDate>Mon, 20 Apr 2026 11:49:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21081">StumblingAlong</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13594.html</guid>
			<description><![CDATA[Hello All,<br />
<br />
Hashcat noob here, been trying for a couple of days to find a password for a .7z file I created and forgot the password for, so far with no success so it's time to ask for some help.<br />
<br />
The password I believe is 25 characters in length, the first 20 of which are lower case letters, and the last 5 are numbers.<br />
I'm sure I have the letters and their order correct but can't remember what order and exactly what the last 5 numbers are supposed to be.<br />
<br />
I've used The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) and John the Ripper to get the hash, and I'm trying to figure out how to find the password from that hash by entering the letters I already know and I'm hoping hashcat can find the 5 numbers I can't remember.<br />
<br />
Tried lots of things that I don't really understand and so far the only way I've been able to get hashcat to run on the hashfile is by either:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 3 -m 11600 hashcat.txt</code></div></div>or<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 0 -m 11600 hashcat.txt</code></div></div><br />
With hashcat.txt being the file the hash is in.<br />
I did remove the filename (1.7z) from the start of the hash John the Ripper gave before trying anything with hashcat, which I think I was supposed to, so now the hash starts with &#36;7z... instead of 1.7z:&#36;7z...<br />
The hash is 1074 characters.<br />
<br />
If I try to use the Hybrid Wordlist + Mask option it always fails, if I try anything but the above commands it seems to fail.<br />
While those above do seem to be working, I figure the process might be still running when the universe ends and the last star burns out, which is why I'm wanting to know if it's possible to somehow tell hashcat the characters I already know and just have it try to find the remaining 5 numbers I can't remember?<br />
<br />
I tried setting the -O option so it wasn't maxing out the CPU on my old clunker and got a message about too many characters for the password, maximum of 20 I think it said.<br />
Without the -O option I think it said there was a maximum password characters of 256.<br />
<br />
I've been reading stuff and watching tutorials etc. but not getting anywhere.<br />
One result I remember from searching claimed hashcat could only find passwords of a certain length or under, so instead of wasting more time and getting nowhere I thought I'd ask people who know these things.<br />
<br />
Thanks<br />
<br />
P.S. I see when previewing this post the forum software edits my post to include words I did not type when I mentioned that Distro?<br />
What's the deal with that?]]></description>
			<content:encoded><![CDATA[Hello All,<br />
<br />
Hashcat noob here, been trying for a couple of days to find a password for a .7z file I created and forgot the password for, so far with no success so it's time to ask for some help.<br />
<br />
The password I believe is 25 characters in length, the first 20 of which are lower case letters, and the last 5 are numbers.<br />
I'm sure I have the letters and their order correct but can't remember what order and exactly what the last 5 numbers are supposed to be.<br />
<br />
I've used The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) and John the Ripper to get the hash, and I'm trying to figure out how to find the password from that hash by entering the letters I already know and I'm hoping hashcat can find the 5 numbers I can't remember.<br />
<br />
Tried lots of things that I don't really understand and so far the only way I've been able to get hashcat to run on the hashfile is by either:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 3 -m 11600 hashcat.txt</code></div></div>or<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 0 -m 11600 hashcat.txt</code></div></div><br />
With hashcat.txt being the file the hash is in.<br />
I did remove the filename (1.7z) from the start of the hash John the Ripper gave before trying anything with hashcat, which I think I was supposed to, so now the hash starts with &#36;7z... instead of 1.7z:&#36;7z...<br />
The hash is 1074 characters.<br />
<br />
If I try to use the Hybrid Wordlist + Mask option it always fails, if I try anything but the above commands it seems to fail.<br />
While those above do seem to be working, I figure the process might be still running when the universe ends and the last star burns out, which is why I'm wanting to know if it's possible to somehow tell hashcat the characters I already know and just have it try to find the remaining 5 numbers I can't remember?<br />
<br />
I tried setting the -O option so it wasn't maxing out the CPU on my old clunker and got a message about too many characters for the password, maximum of 20 I think it said.<br />
Without the -O option I think it said there was a maximum password characters of 256.<br />
<br />
I've been reading stuff and watching tutorials etc. but not getting anywhere.<br />
One result I remember from searching claimed hashcat could only find passwords of a certain length or under, so instead of wasting more time and getting nowhere I thought I'd ask people who know these things.<br />
<br />
Thanks<br />
<br />
P.S. I see when previewing this post the forum software edits my post to include words I did not type when I mentioned that Distro?<br />
What's the deal with that?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[multi GPUs configuration/overclocking]]></title>
			<link>https://hashcat.net/forum/thread-13593.html</link>
			<pubDate>Fri, 17 Apr 2026 17:48:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20997">kryptyk</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13593.html</guid>
			<description><![CDATA[Hi there,<br />
I am wandering if anybody can share tips on configuration/overclocking of a multi GPU rig running nvidia GPUs in an Ubuntu Linux environment to improve performance or enhance hash-rate with hashcat?<br />
I have it running smoothly, but I think I could speed things up a little by overclocking.<br />
Any tips or link to tutorials will be appreciated.<br />
Many thanks.<br />
<br />
\m/~ (&gt;_&lt;) ~\m/]]></description>
			<content:encoded><![CDATA[Hi there,<br />
I am wandering if anybody can share tips on configuration/overclocking of a multi GPU rig running nvidia GPUs in an Ubuntu Linux environment to improve performance or enhance hash-rate with hashcat?<br />
I have it running smoothly, but I think I could speed things up a little by overclocking.<br />
Any tips or link to tutorials will be appreciated.<br />
Many thanks.<br />
<br />
\m/~ (&gt;_&lt;) ~\m/]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[trying to learn hashcat]]></title>
			<link>https://hashcat.net/forum/thread-13583.html</link>
			<pubDate>Tue, 14 Apr 2026 21:15:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21059">ari2asem</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13583.html</guid>
			<description><![CDATA[first of all.....this is learning project for me<br />
<br />
situation is next:<br />
<br />
 - i have multivolume RAR-files (part01, part02.....part11)<br />
 - it has hash format 12500 rar3-hp<br />
 - i know the password (lower alpha and numeric). i can unrar the archive. so i am not after the password, but trying to learn the use of hashcat.<br />
 - i made wordlist of 430 different entries with lower-alpha and numbers. <br />
<br />
hashcat can't recover my password.<br />
<br />
command is<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code> &gt;hashcat.exe -a 0 -m 12500 -w 3 -S --session=tmp62B7 --potfile-disable -p : --hwmon-temp-abort=75 -o "C:&#92;Users&#92;xxxx&#92;Downloads&#92;hashcat-7.1.2&#92;output.txt" --outfile-format=1,2 "C:&#92;Users&#92;xxxx&#92;AppData&#92;Local&#92;Temp&#92;tmp62B7.tmp" "C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt"<br />
hashcat (v7.1.2) starting - session [tmp62B7]</code></div></div><br />
<br />
and this the result of the running session<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) UHD Graphics 730, 15122/30244 MB (2047 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 0<br />
Maximum password length supported by kernel: 128<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hashes: 1 digests; 1 unique digests, 1 unique salts<br />
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates<br />
Rules: 1<br />
<br />
Optimizers applied:<br />
* Zero-Byte<br />
* Single-Hash<br />
* Single-Salt<br />
<br />
ATTENTION! Pure (unoptimized) backend kernels selected.<br />
Pure kernels can crack longer passwords, but drastically reduce performance.<br />
If you want to switch to optimized kernels, append -O to your commandline.<br />
See the above message to find out about the exact limits.<br />
<br />
Watchdog: Hardware monitoring interface not found on your system.<br />
Watchdog: Temperature abort trigger disabled.<br />
<br />
Host memory allocated for this attack: 2775 MB (53141 MB free)<br />
<br />
Dictionary cache built:<br />
* Filename..: C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt<br />
* Passwords.: 430<br />
* Bytes.....: 5986<br />
* Keyspace..: 430<br />
* Runtime...: 0 secs<br />
<br />
Approaching final keyspace - workload adjusted.<br />
<br />
Session..........: tmp62B7<br />
Status...........: Exhausted<br />
Hash.Mode........: 12500 (RAR3-hp)<br />
Hash.Target......: &#36;RAR3&#36;*0*9f54??????*4ba4e??????????<br />
Time.Started.....: Tue Apr 14 22:49:43 2026 (5 secs)<br />
Time.Estimated...: Tue Apr 14 22:49:48 2026 (0 secs)<br />
Kernel.Feature...: Pure Kernel (password length 0-128 bytes)<br />
Guess.Base.......: File (C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt)<br />
Guess.Queue......: 1/1 (100.00%)<br />
Speed.#01........:      110 H/s (116.88ms) @ Accel:1 Loops:16384 Thr:36 Vec:1<br />
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)<br />
Progress.........: 430/430 (100.00%)<br />
Rejected.........: 0/430 (0.00%)<br />
Restore.Point....: 430/430 (100.00%)<br />
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:245760-262144<br />
Candidate.Engine.: Host Generator + PCIe<br />
Candidates.#01...: test8227768 -&gt; test9993139<br />
<br />
Started: Tue Apr 14 22:49:37 2026<br />
Stopped: Tue Apr 14 22:49:49 2026</code></div></div><br />
WinRAR info says<span style="font-weight: bold;" class="mycode_b"> "RAR 4.x Volume, data and names encrypted".</span><br />
<br />
what am i doing wrong?<br />
why can't hashcat find the password which is in the wordlist?]]></description>
			<content:encoded><![CDATA[first of all.....this is learning project for me<br />
<br />
situation is next:<br />
<br />
 - i have multivolume RAR-files (part01, part02.....part11)<br />
 - it has hash format 12500 rar3-hp<br />
 - i know the password (lower alpha and numeric). i can unrar the archive. so i am not after the password, but trying to learn the use of hashcat.<br />
 - i made wordlist of 430 different entries with lower-alpha and numbers. <br />
<br />
hashcat can't recover my password.<br />
<br />
command is<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code> &gt;hashcat.exe -a 0 -m 12500 -w 3 -S --session=tmp62B7 --potfile-disable -p : --hwmon-temp-abort=75 -o "C:&#92;Users&#92;xxxx&#92;Downloads&#92;hashcat-7.1.2&#92;output.txt" --outfile-format=1,2 "C:&#92;Users&#92;xxxx&#92;AppData&#92;Local&#92;Temp&#92;tmp62B7.tmp" "C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt"<br />
hashcat (v7.1.2) starting - session [tmp62B7]</code></div></div><br />
<br />
and this the result of the running session<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) UHD Graphics 730, 15122/30244 MB (2047 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 0<br />
Maximum password length supported by kernel: 128<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hashes: 1 digests; 1 unique digests, 1 unique salts<br />
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates<br />
Rules: 1<br />
<br />
Optimizers applied:<br />
* Zero-Byte<br />
* Single-Hash<br />
* Single-Salt<br />
<br />
ATTENTION! Pure (unoptimized) backend kernels selected.<br />
Pure kernels can crack longer passwords, but drastically reduce performance.<br />
If you want to switch to optimized kernels, append -O to your commandline.<br />
See the above message to find out about the exact limits.<br />
<br />
Watchdog: Hardware monitoring interface not found on your system.<br />
Watchdog: Temperature abort trigger disabled.<br />
<br />
Host memory allocated for this attack: 2775 MB (53141 MB free)<br />
<br />
Dictionary cache built:<br />
* Filename..: C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt<br />
* Passwords.: 430<br />
* Bytes.....: 5986<br />
* Keyspace..: 430<br />
* Runtime...: 0 secs<br />
<br />
Approaching final keyspace - workload adjusted.<br />
<br />
Session..........: tmp62B7<br />
Status...........: Exhausted<br />
Hash.Mode........: 12500 (RAR3-hp)<br />
Hash.Target......: &#36;RAR3&#36;*0*9f54??????*4ba4e??????????<br />
Time.Started.....: Tue Apr 14 22:49:43 2026 (5 secs)<br />
Time.Estimated...: Tue Apr 14 22:49:48 2026 (0 secs)<br />
Kernel.Feature...: Pure Kernel (password length 0-128 bytes)<br />
Guess.Base.......: File (C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt)<br />
Guess.Queue......: 1/1 (100.00%)<br />
Speed.#01........:      110 H/s (116.88ms) @ Accel:1 Loops:16384 Thr:36 Vec:1<br />
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)<br />
Progress.........: 430/430 (100.00%)<br />
Rejected.........: 0/430 (0.00%)<br />
Restore.Point....: 430/430 (100.00%)<br />
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:245760-262144<br />
Candidate.Engine.: Host Generator + PCIe<br />
Candidates.#01...: test8227768 -&gt; test9993139<br />
<br />
Started: Tue Apr 14 22:49:37 2026<br />
Stopped: Tue Apr 14 22:49:49 2026</code></div></div><br />
WinRAR info says<span style="font-weight: bold;" class="mycode_b"> "RAR 4.x Volume, data and names encrypted".</span><br />
<br />
what am i doing wrong?<br />
why can't hashcat find the password which is in the wordlist?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Need help recovering DiskCryptor password - first time user]]></title>
			<link>https://hashcat.net/forum/thread-13582.html</link>
			<pubDate>Tue, 14 Apr 2026 15:19:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21067">system</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13582.html</guid>
			<description><![CDATA[Hi everyone,<br />
<br />
I am a first-time user and I need some help recovering access to an encrypted partition on my Windows 11 computer.<br />
<br />
Here is my situation:<br />
- I encrypted a partition using DiskCryptor 1.3 Beta<br />
- The partition is [internal/external, size if known]<br />
- I have forgotten the password and cannot access the partition<br />
- I do NOT have a backup of the header (if true)<br />
- I am not experienced with hashcat or password recovery tools<br />
- This is my own computer and my own data<br />
<br />
I have already downloaded:<br />
- Hashcat 7.1.2<br />
- John the Ripper 1.9.0 Jumbo (Windows 64-bit)<br />
<br />
<br />
Any help would be greatly appreciated. I just want to recover access to my own files.<br />
<br />
Thank you in advance]]></description>
			<content:encoded><![CDATA[Hi everyone,<br />
<br />
I am a first-time user and I need some help recovering access to an encrypted partition on my Windows 11 computer.<br />
<br />
Here is my situation:<br />
- I encrypted a partition using DiskCryptor 1.3 Beta<br />
- The partition is [internal/external, size if known]<br />
- I have forgotten the password and cannot access the partition<br />
- I do NOT have a backup of the header (if true)<br />
- I am not experienced with hashcat or password recovery tools<br />
- This is my own computer and my own data<br />
<br />
I have already downloaded:<br />
- Hashcat 7.1.2<br />
- John the Ripper 1.9.0 Jumbo (Windows 64-bit)<br />
<br />
<br />
Any help would be greatly appreciated. I just want to recover access to my own files.<br />
<br />
Thank you in advance]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Legacy Server Benchmarking: Optimizing Hashcat on Hexa Core Xeons (ProLiant BL460C)]]></title>
			<link>https://hashcat.net/forum/thread-13580.html</link>
			<pubDate>Mon, 13 Apr 2026 13:28:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21064">boteh35959</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13580.html</guid>
			<description><![CDATA[<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">Hey everyone, I’ve been a long-time reader of the hardware benchmarks here, but I finally have a specific project that prompted me to start a thread. I recently came into possession of some retired enterprise gear: a couple of HP ProLiant BL460C blades. These are older units, each running dual <a href="https://serverorbit.com/pc-and-servers/proliant-bl460c/hexa-core-2-4ghz-xeon" target="_blank" rel="noopener" class="mycode_url">Hexa Core 2.4GHz Xeon processors</a>. Now, I know the general consensus in the community is that GPUs are the undisputed kings for Hashcat, but I’m interested in seeing what these can do for specific algorithms where CPU-based cracking isn't completely irrelevant—perhaps for some of the more memory-hard or CPU-intensive KDFs.</span></span><br />
<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">The specific point I’m stuck on is the OpenCL implementation for these older Xeons. I’ve seen some conflicting info on whether the Intel CPU Runtime provides meaningful scaling when you're dealing with older architectures like this. In my limited testing, I’ve found that even though I have 12 physical cores (24 threads) available across the blade, the relatively low 2.4GHz clock speed seems to be a real bottleneck for anything beyond very basic wordlist attacks.</span></span><br />
<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">Personally, I just love the industrial feel of these blade servers. There’s something incredibly nostalgic about repurposing 10-year-old "top-tier" hardware, even if the fans sound like they’re trying to achieve liftoff when the workload kicks in. My little homelab setup is great for learning, but I’m wondering if I’m just fighting a losing battle against modern hardware efficiency.</span></span><br />
<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">Does anyone here have experience running Hashcat on older blade infrastructure, or perhaps tips on optimizing the Intel OpenCL runtime for these specific Xeon families to get the most out of the available threads? Or is the performance-to-power ratio so skewed that I’m better off just using them as a space heater for the winter?</span></span>]]></description>
			<content:encoded><![CDATA[<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">Hey everyone, I’ve been a long-time reader of the hardware benchmarks here, but I finally have a specific project that prompted me to start a thread. I recently came into possession of some retired enterprise gear: a couple of HP ProLiant BL460C blades. These are older units, each running dual <a href="https://serverorbit.com/pc-and-servers/proliant-bl460c/hexa-core-2-4ghz-xeon" target="_blank" rel="noopener" class="mycode_url">Hexa Core 2.4GHz Xeon processors</a>. Now, I know the general consensus in the community is that GPUs are the undisputed kings for Hashcat, but I’m interested in seeing what these can do for specific algorithms where CPU-based cracking isn't completely irrelevant—perhaps for some of the more memory-hard or CPU-intensive KDFs.</span></span><br />
<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">The specific point I’m stuck on is the OpenCL implementation for these older Xeons. I’ve seen some conflicting info on whether the Intel CPU Runtime provides meaningful scaling when you're dealing with older architectures like this. In my limited testing, I’ve found that even though I have 12 physical cores (24 threads) available across the blade, the relatively low 2.4GHz clock speed seems to be a real bottleneck for anything beyond very basic wordlist attacks.</span></span><br />
<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">Personally, I just love the industrial feel of these blade servers. There’s something incredibly nostalgic about repurposing 10-year-old "top-tier" hardware, even if the fans sound like they’re trying to achieve liftoff when the workload kicks in. My little homelab setup is great for learning, but I’m wondering if I’m just fighting a losing battle against modern hardware efficiency.</span></span><br />
<span style="color: #2b2d31;" class="mycode_color"><span style="font-family: Inter, sans-serif;" class="mycode_font">Does anyone here have experience running Hashcat on older blade infrastructure, or perhaps tips on optimizing the Intel OpenCL runtime for these specific Xeon families to get the most out of the available threads? Or is the performance-to-power ratio so skewed that I’m better off just using them as a space heater for the winter?</span></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I hit what looks like a Hashcat/ ssh2john format mismatch in the SSH key passphrase l]]></title>
			<link>https://hashcat.net/forum/thread-13579.html</link>
			<pubDate>Thu, 09 Apr 2026 18:15:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21057">misskarriew</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13579.html</guid>
			<description><![CDATA[I hit what looks like a Hashcat/<br />
ssh2john<br />
format mismatch in the SSH key passphrase lab.<br />
id_rsa<br />
is valid now — <br />
ssh-keygen -y -f id_rsa<br />
prompts for the passphrase.<br />
I extracted with:<br />
<br />
ssh2john id_rsa &gt; ssh.hash<br />
<br />
ssh.hash<br />
is one clean line starting with:<br />
<br />
id_rsa:&#36;sshng&#36;6&#36;16&#36;...<br />
<br />
But Hashcat <br />
v7.1.2<br />
rejects it:<br />
<br />
hashcat -m 22921 ssh.hash ssh.passwords -r ssh.rule<br />
<br />
Error:<br />
<br />
Token length exception<br />
No hashes loaded<br />
<br />
And:<br />
<br />
hashcat --identify ssh.hash<br />
<br />
returns:<br />
<br />
No hash-mode matches the structure of the input hash.<br />
<br />
Has anyone seen this with newer OpenSSH <br />
&#36;sshng&#36;6&#36;16&#36;...<br />
hashes? Is mode <br />
22921<br />
currently incompatible with <br />
ssh2john<br />
output here, or is there a different extractor/workflow I should be using?]]></description>
			<content:encoded><![CDATA[I hit what looks like a Hashcat/<br />
ssh2john<br />
format mismatch in the SSH key passphrase lab.<br />
id_rsa<br />
is valid now — <br />
ssh-keygen -y -f id_rsa<br />
prompts for the passphrase.<br />
I extracted with:<br />
<br />
ssh2john id_rsa &gt; ssh.hash<br />
<br />
ssh.hash<br />
is one clean line starting with:<br />
<br />
id_rsa:&#36;sshng&#36;6&#36;16&#36;...<br />
<br />
But Hashcat <br />
v7.1.2<br />
rejects it:<br />
<br />
hashcat -m 22921 ssh.hash ssh.passwords -r ssh.rule<br />
<br />
Error:<br />
<br />
Token length exception<br />
No hashes loaded<br />
<br />
And:<br />
<br />
hashcat --identify ssh.hash<br />
<br />
returns:<br />
<br />
No hash-mode matches the structure of the input hash.<br />
<br />
Has anyone seen this with newer OpenSSH <br />
&#36;sshng&#36;6&#36;16&#36;...<br />
hashes? Is mode <br />
22921<br />
currently incompatible with <br />
ssh2john<br />
output here, or is there a different extractor/workflow I should be using?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[noob needs help]]></title>
			<link>https://hashcat.net/forum/thread-13578.html</link>
			<pubDate>Thu, 09 Apr 2026 07:07:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21053">idek</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13578.html</guid>
			<description><![CDATA[help this keeps showing]]></description>
			<content:encoded><![CDATA[help this keeps showing]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Please Help !]]></title>
			<link>https://hashcat.net/forum/thread-13577.html</link>
			<pubDate>Mon, 06 Apr 2026 14:41:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21047">illusion147</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13577.html</guid>
			<description><![CDATA[Hi, <br />
<br />
I actually have a Crucial X10 Pro SSD, which I locked with a password using the "Crucial Portable SSD Utility" software. I believe this software from Crucial use a 256-bit encryption to lock the SSD. <br />
<br />
I know a couple of password options, is there any way you can help my use Hashcat for this software ? <br />
<br />
I have lot all my collection of pictures and vidoes of my dead grandfather who I was extremely close too, I was his only grandson. <br />
<br />
Grateful if anyone can help me ! <br />
<br />
Thanking you, <br />
Best regards, <br />
Ajay Shriram]]></description>
			<content:encoded><![CDATA[Hi, <br />
<br />
I actually have a Crucial X10 Pro SSD, which I locked with a password using the "Crucial Portable SSD Utility" software. I believe this software from Crucial use a 256-bit encryption to lock the SSD. <br />
<br />
I know a couple of password options, is there any way you can help my use Hashcat for this software ? <br />
<br />
I have lot all my collection of pictures and vidoes of my dead grandfather who I was extremely close too, I was his only grandson. <br />
<br />
Grateful if anyone can help me ! <br />
<br />
Thanking you, <br />
Best regards, <br />
Ajay Shriram]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I can't get it to work]]></title>
			<link>https://hashcat.net/forum/thread-13575.html</link>
			<pubDate>Thu, 02 Apr 2026 06:25:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21032">Ricybily</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13575.html</guid>
			<description><![CDATA[I've been trying many methods to get it working since it all started when I first installed it on my Windows 10 machine with a 5050. When I try to use Hashcat, it tells me I need compatible drivers and that I need to change them. I followed the entire process to change the drivers on the website, and when I finally manage to install them, it starts giving this error and I can't get past it.<img src="https://pasteboard.co/8qgpSWwoglKP.png" loading="lazy"  alt="[Image: 8qgpSWwoglKP.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[I've been trying many methods to get it working since it all started when I first installed it on my Windows 10 machine with a 5050. When I try to use Hashcat, it tells me I need compatible drivers and that I need to change them. I followed the entire process to change the drivers on the website, and when I finally manage to install them, it starts giving this error and I can't get past it.<img src="https://pasteboard.co/8qgpSWwoglKP.png" loading="lazy"  alt="[Image: 8qgpSWwoglKP.png]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[noob can anyone help]]></title>
			<link>https://hashcat.net/forum/thread-13567.html</link>
			<pubDate>Mon, 23 Mar 2026 16:00:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21002">ste980</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13567.html</guid>
			<description><![CDATA[this is what message i get when i try to run an attack<br />
<br />
C:\hashcat-7.1.2&gt;hashcat.exe -m 22000 output_hash.hc22000 -a 3 ?a?a?a?a?a?a?a?a?a?a<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) Graphics, 3543/7086 MB (1771 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hash 'output_hash.hc22000': Separator unmatched<br />
No hashes loaded.]]></description>
			<content:encoded><![CDATA[this is what message i get when i try to run an attack<br />
<br />
C:\hashcat-7.1.2&gt;hashcat.exe -m 22000 output_hash.hc22000 -a 3 ?a?a?a?a?a?a?a?a?a?a<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) Graphics, 3543/7086 MB (1771 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hash 'output_hash.hc22000': Separator unmatched<br />
No hashes loaded.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A question on logic and approaches to cracking]]></title>
			<link>https://hashcat.net/forum/thread-13566.html</link>
			<pubDate>Sat, 21 Mar 2026 22:52:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20997">kryptyk</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13566.html</guid>
			<description><![CDATA[Hi all,<br />
I am pretty new to hashcat, so please forgive me if I am missing the obvious.<br />
<br />
I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting.<br />
<br />
 I have tried:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a?a?a?a?a?a?a &lt;- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results.<br />
<br />
<br />
With no luck. I tried just finding out the first two characters alone:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a also no results.<br />
<br />
But got some warning about now giving hashcat enough work, however it found nothing...<br />
Maybe I am missing something obvious?<br />
<br />
Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces)  in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward.<br />
<br />
Is that logic correct in your experience?<br />
<br />
Thank you.]]></description>
			<content:encoded><![CDATA[Hi all,<br />
I am pretty new to hashcat, so please forgive me if I am missing the obvious.<br />
<br />
I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting.<br />
<br />
 I have tried:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a?a?a?a?a?a?a &lt;- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results.<br />
<br />
<br />
With no luck. I tried just finding out the first two characters alone:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a also no results.<br />
<br />
But got some warning about now giving hashcat enough work, however it found nothing...<br />
Maybe I am missing something obvious?<br />
<br />
Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces)  in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward.<br />
<br />
Is that logic correct in your experience?<br />
<br />
Thank you.]]></content:encoded>
		</item>
	</channel>
</rss>