<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - All Forums]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Fri, 10 Apr 2026 22:01:17 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[I hit what looks like a Hashcat/ ssh2john format mismatch in the SSH key passphrase l]]></title>
			<link>https://hashcat.net/forum/thread-13579.html</link>
			<pubDate>Thu, 09 Apr 2026 18:15:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21057">misskarriew</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13579.html</guid>
			<description><![CDATA[I hit what looks like a Hashcat/<br />
ssh2john<br />
format mismatch in the SSH key passphrase lab.<br />
id_rsa<br />
is valid now — <br />
ssh-keygen -y -f id_rsa<br />
prompts for the passphrase.<br />
I extracted with:<br />
<br />
ssh2john id_rsa &gt; ssh.hash<br />
<br />
ssh.hash<br />
is one clean line starting with:<br />
<br />
id_rsa:&#36;sshng&#36;6&#36;16&#36;...<br />
<br />
But Hashcat <br />
v7.1.2<br />
rejects it:<br />
<br />
hashcat -m 22921 ssh.hash ssh.passwords -r ssh.rule<br />
<br />
Error:<br />
<br />
Token length exception<br />
No hashes loaded<br />
<br />
And:<br />
<br />
hashcat --identify ssh.hash<br />
<br />
returns:<br />
<br />
No hash-mode matches the structure of the input hash.<br />
<br />
Has anyone seen this with newer OpenSSH <br />
&#36;sshng&#36;6&#36;16&#36;...<br />
hashes? Is mode <br />
22921<br />
currently incompatible with <br />
ssh2john<br />
output here, or is there a different extractor/workflow I should be using?]]></description>
			<content:encoded><![CDATA[I hit what looks like a Hashcat/<br />
ssh2john<br />
format mismatch in the SSH key passphrase lab.<br />
id_rsa<br />
is valid now — <br />
ssh-keygen -y -f id_rsa<br />
prompts for the passphrase.<br />
I extracted with:<br />
<br />
ssh2john id_rsa &gt; ssh.hash<br />
<br />
ssh.hash<br />
is one clean line starting with:<br />
<br />
id_rsa:&#36;sshng&#36;6&#36;16&#36;...<br />
<br />
But Hashcat <br />
v7.1.2<br />
rejects it:<br />
<br />
hashcat -m 22921 ssh.hash ssh.passwords -r ssh.rule<br />
<br />
Error:<br />
<br />
Token length exception<br />
No hashes loaded<br />
<br />
And:<br />
<br />
hashcat --identify ssh.hash<br />
<br />
returns:<br />
<br />
No hash-mode matches the structure of the input hash.<br />
<br />
Has anyone seen this with newer OpenSSH <br />
&#36;sshng&#36;6&#36;16&#36;...<br />
hashes? Is mode <br />
22921<br />
currently incompatible with <br />
ssh2john<br />
output here, or is there a different extractor/workflow I should be using?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[noob needs help]]></title>
			<link>https://hashcat.net/forum/thread-13578.html</link>
			<pubDate>Thu, 09 Apr 2026 07:07:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21053">idek</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13578.html</guid>
			<description><![CDATA[help this keeps showing]]></description>
			<content:encoded><![CDATA[help this keeps showing]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Please Help !]]></title>
			<link>https://hashcat.net/forum/thread-13577.html</link>
			<pubDate>Mon, 06 Apr 2026 14:41:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21047">illusion147</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13577.html</guid>
			<description><![CDATA[Hi, <br />
<br />
I actually have a Crucial X10 Pro SSD, which I locked with a password using the "Crucial Portable SSD Utility" software. I believe this software from Crucial use a 256-bit encryption to lock the SSD. <br />
<br />
I know a couple of password options, is there any way you can help my use Hashcat for this software ? <br />
<br />
I have lot all my collection of pictures and vidoes of my dead grandfather who I was extremely close too, I was his only grandson. <br />
<br />
Grateful if anyone can help me ! <br />
<br />
Thanking you, <br />
Best regards, <br />
Ajay Shriram]]></description>
			<content:encoded><![CDATA[Hi, <br />
<br />
I actually have a Crucial X10 Pro SSD, which I locked with a password using the "Crucial Portable SSD Utility" software. I believe this software from Crucial use a 256-bit encryption to lock the SSD. <br />
<br />
I know a couple of password options, is there any way you can help my use Hashcat for this software ? <br />
<br />
I have lot all my collection of pictures and vidoes of my dead grandfather who I was extremely close too, I was his only grandson. <br />
<br />
Grateful if anyone can help me ! <br />
<br />
Thanking you, <br />
Best regards, <br />
Ajay Shriram]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I can't get it to work]]></title>
			<link>https://hashcat.net/forum/thread-13575.html</link>
			<pubDate>Thu, 02 Apr 2026 06:25:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21032">Ricybily</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13575.html</guid>
			<description><![CDATA[I've been trying many methods to get it working since it all started when I first installed it on my Windows 10 machine with a 5050. When I try to use Hashcat, it tells me I need compatible drivers and that I need to change them. I followed the entire process to change the drivers on the website, and when I finally manage to install them, it starts giving this error and I can't get past it.<img src="https://pasteboard.co/8qgpSWwoglKP.png" loading="lazy"  alt="[Image: 8qgpSWwoglKP.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[I've been trying many methods to get it working since it all started when I first installed it on my Windows 10 machine with a 5050. When I try to use Hashcat, it tells me I need compatible drivers and that I need to change them. I followed the entire process to change the drivers on the website, and when I finally manage to install them, it starts giving this error and I can't get past it.<img src="https://pasteboard.co/8qgpSWwoglKP.png" loading="lazy"  alt="[Image: 8qgpSWwoglKP.png]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[noob can anyone help]]></title>
			<link>https://hashcat.net/forum/thread-13567.html</link>
			<pubDate>Mon, 23 Mar 2026 16:00:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21002">ste980</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13567.html</guid>
			<description><![CDATA[this is what message i get when i try to run an attack<br />
<br />
C:\hashcat-7.1.2&gt;hashcat.exe -m 22000 output_hash.hc22000 -a 3 ?a?a?a?a?a?a?a?a?a?a<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) Graphics, 3543/7086 MB (1771 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hash 'output_hash.hc22000': Separator unmatched<br />
No hashes loaded.]]></description>
			<content:encoded><![CDATA[this is what message i get when i try to run an attack<br />
<br />
C:\hashcat-7.1.2&gt;hashcat.exe -m 22000 output_hash.hc22000 -a 3 ?a?a?a?a?a?a?a?a?a?a<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) Graphics, 3543/7086 MB (1771 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hash 'output_hash.hc22000': Separator unmatched<br />
No hashes loaded.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A question on logic and approaches to cracking]]></title>
			<link>https://hashcat.net/forum/thread-13566.html</link>
			<pubDate>Sat, 21 Mar 2026 22:52:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20997">kryptyk</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13566.html</guid>
			<description><![CDATA[Hi all,<br />
I am pretty new to hashcat, so please forgive me if I am missing the obvious.<br />
<br />
I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting.<br />
<br />
 I have tried:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a?a?a?a?a?a?a &lt;- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results.<br />
<br />
<br />
With no luck. I tried just finding out the first two characters alone:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a also no results.<br />
<br />
But got some warning about now giving hashcat enough work, however it found nothing...<br />
Maybe I am missing something obvious?<br />
<br />
Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces)  in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward.<br />
<br />
Is that logic correct in your experience?<br />
<br />
Thank you.]]></description>
			<content:encoded><![CDATA[Hi all,<br />
I am pretty new to hashcat, so please forgive me if I am missing the obvious.<br />
<br />
I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting.<br />
<br />
 I have tried:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a?a?a?a?a?a?a &lt;- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results.<br />
<br />
<br />
With no luck. I tried just finding out the first two characters alone:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a also no results.<br />
<br />
But got some warning about now giving hashcat enough work, however it found nothing...<br />
Maybe I am missing something obvious?<br />
<br />
Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces)  in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward.<br />
<br />
Is that logic correct in your experience?<br />
<br />
Thank you.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Help with code]]></title>
			<link>https://hashcat.net/forum/thread-13565.html</link>
			<pubDate>Sat, 21 Mar 2026 15:17:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20999">LittleElla</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13565.html</guid>
			<description><![CDATA[Hello!<br />
I'm new here and I was just trying to use Hashcat to get my password back.<br />
It is a rar file and I know part of the password. <br />
This line bellow is from the code I was trying to run with CMD (I already have the hash):<br />
<br />
<span style="font-weight: bold;" class="mycode_b">hashcat.exe -m 13000 -a3 hash 321654?s?s?s</span><br />
<br />
The point is, I know it starts with "321654," and the last three characters are somewhere in this sequence: /?1!2@3#.<br />
<br />
Can anybody help me please?]]></description>
			<content:encoded><![CDATA[Hello!<br />
I'm new here and I was just trying to use Hashcat to get my password back.<br />
It is a rar file and I know part of the password. <br />
This line bellow is from the code I was trying to run with CMD (I already have the hash):<br />
<br />
<span style="font-weight: bold;" class="mycode_b">hashcat.exe -m 13000 -a3 hash 321654?s?s?s</span><br />
<br />
The point is, I know it starts with "321654," and the last three characters are somewhere in this sequence: /?1!2@3#.<br />
<br />
Can anybody help me please?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cracking Protected Text HTML]]></title>
			<link>https://hashcat.net/forum/thread-13563.html</link>
			<pubDate>Thu, 19 Mar 2026 22:25:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20991">qazmit</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13563.html</guid>
			<description><![CDATA[Hi<br />
<br />
Firsly, I am a complete Hashcat newbie so I know nothing about how to use it.<br />
<br />
A while ago, I copied to my hard drive the HTML page for a Protected Text page from protectedtext.com. Unfortunately, I have forgotten the password for it.<br />
<br />
Please can you give me step-by-step instructions for using Hashcat to crack the HTML page that I downloaded.<br />
<br />
I am halfway proficient at Javascript so I may or may not be able to make alterations to the Protected Text Javascript if necessary.<br />
<br />
Thank you very much]]></description>
			<content:encoded><![CDATA[Hi<br />
<br />
Firsly, I am a complete Hashcat newbie so I know nothing about how to use it.<br />
<br />
A while ago, I copied to my hard drive the HTML page for a Protected Text page from protectedtext.com. Unfortunately, I have forgotten the password for it.<br />
<br />
Please can you give me step-by-step instructions for using Hashcat to crack the HTML page that I downloaded.<br />
<br />
I am halfway proficient at Javascript so I may or may not be able to make alterations to the Protected Text Javascript if necessary.<br />
<br />
Thank you very much]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Configuring checkpoint timer to save progress]]></title>
			<link>https://hashcat.net/forum/thread-13557.html</link>
			<pubDate>Tue, 17 Mar 2026 16:45:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20985">sherlock</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13557.html</guid>
			<description><![CDATA[Can someone please help me understand how to use checkpoint timers to save progress so that i can continue to run from the previous checkpoint after closing the program.<br />
I am new to using Hashcat and I tried to find something like a syntax or keywords guide, but couldn't find anything helpful. Thank you for reading this.]]></description>
			<content:encoded><![CDATA[Can someone please help me understand how to use checkpoint timers to save progress so that i can continue to run from the previous checkpoint after closing the program.<br />
I am new to using Hashcat and I tried to find something like a syntax or keywords guide, but couldn't find anything helpful. Thank you for reading this.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Bitwarden hash format(s)]]></title>
			<link>https://hashcat.net/forum/thread-13554.html</link>
			<pubDate>Tue, 17 Mar 2026 07:49:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20981">arandomcat</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13554.html</guid>
			<description><![CDATA[Hi all,<br />
<br />
A friend's forgotten their Bitwarden password (remembers the parts of the password but not which parts they used/what order...) so I'm going to run a custom wordlist of permutations of those fragments.<br />
<br />
However the hash they got out of Bitwarden doesn't match the format in the examples (waiting on them to get back to me with the tool they used to extract it in case it's just a dumb tool issue), the example hash from the wiki is;<br />
&#36;bitwarden&#36;2*100000*2*bmXXXXXXXXXXXXXXXXXXXXXXdA==*+v5XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXfg=<br />
<br />
But their extracted hash is;<br />
&#36;bitwarden&#36;1*700000*YnXXXXXXXXXXXXXXXXXXXXXXX20=*jxXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3o=<br />
<br />
The &#36;1 vs &#36;2 and lack of the extra field after the iterations count would tend to make me think this is a different mode (but I'd typically assume &#36;2 to be newer so it would surprise me if hashcat supported the newer hash format but not the older one)?<br />
<br />
Has anybody run into this?<br />
<br />
Thanks]]></description>
			<content:encoded><![CDATA[Hi all,<br />
<br />
A friend's forgotten their Bitwarden password (remembers the parts of the password but not which parts they used/what order...) so I'm going to run a custom wordlist of permutations of those fragments.<br />
<br />
However the hash they got out of Bitwarden doesn't match the format in the examples (waiting on them to get back to me with the tool they used to extract it in case it's just a dumb tool issue), the example hash from the wiki is;<br />
&#36;bitwarden&#36;2*100000*2*bmXXXXXXXXXXXXXXXXXXXXXXdA==*+v5XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXfg=<br />
<br />
But their extracted hash is;<br />
&#36;bitwarden&#36;1*700000*YnXXXXXXXXXXXXXXXXXXXXXXX20=*jxXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3o=<br />
<br />
The &#36;1 vs &#36;2 and lack of the extra field after the iterations count would tend to make me think this is a different mode (but I'd typically assume &#36;2 to be newer so it would surprise me if hashcat supported the newer hash format but not the older one)?<br />
<br />
Has anybody run into this?<br />
<br />
Thanks]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[large cipher on krb5pa hash]]></title>
			<link>https://hashcat.net/forum/thread-13494.html</link>
			<pubDate>Mon, 23 Feb 2026 15:05:06 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20863">skyronin</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13494.html</guid>
			<description><![CDATA[Hi,<br />
Im kinda new to all of this so im sorry in advance if i do any mistake/misteps while asking my question here.<br />
<br />
Anyway, im trying to finish a Root-Me challenge that ask me to find the password of a user linked to a suspicious kerberos connection in a PCAP file. I extracted manually a krb5 pre-authentication hash from this file (i extracted the "CNameString", the "Realm", the "etype" and the "cipher") from one AS-REP request. In my case, the etype is 18.<br />
I assembled thoses informations like the following in a file "krb_hash.txt" :<br />
&#36;krb5pa&#36;18&#36;&lt;username&gt;&#36;&lt;realm&gt;&#36;&lt;cipher&gt;.<br />
<br />
My problem is that the cipher i have in the AS-REP in the pcap file is waaaaaay longer than the cipher length that i see in the <a href="https://hashcat.net/wiki/doku.php?id=example_hashes" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/wiki/doku.php?id=example_hashes</a>.<br />
To be more precise, in the examples hashes i see that the cipher corresponding to my etype is supposed to 112 characters long, while the cipher i have in the pcap file is 548 characters long...<br />
When i try to launch a hascat on my file i get the following error :<br />
"Hashfile 'krb_hash.txt' on line 1 (&#36;krb5p...f4320028a648c94d209d772d88a161e0): Token length exception"<br />
<br />
I tried to cut the cipher to make it exactly 112 characters long (in which case the hashcat launches correctly) but obviously i get no result from this.<br />
<br />
What should i do?]]></description>
			<content:encoded><![CDATA[Hi,<br />
Im kinda new to all of this so im sorry in advance if i do any mistake/misteps while asking my question here.<br />
<br />
Anyway, im trying to finish a Root-Me challenge that ask me to find the password of a user linked to a suspicious kerberos connection in a PCAP file. I extracted manually a krb5 pre-authentication hash from this file (i extracted the "CNameString", the "Realm", the "etype" and the "cipher") from one AS-REP request. In my case, the etype is 18.<br />
I assembled thoses informations like the following in a file "krb_hash.txt" :<br />
&#36;krb5pa&#36;18&#36;&lt;username&gt;&#36;&lt;realm&gt;&#36;&lt;cipher&gt;.<br />
<br />
My problem is that the cipher i have in the AS-REP in the pcap file is waaaaaay longer than the cipher length that i see in the <a href="https://hashcat.net/wiki/doku.php?id=example_hashes" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/wiki/doku.php?id=example_hashes</a>.<br />
To be more precise, in the examples hashes i see that the cipher corresponding to my etype is supposed to 112 characters long, while the cipher i have in the pcap file is 548 characters long...<br />
When i try to launch a hascat on my file i get the following error :<br />
"Hashfile 'krb_hash.txt' on line 1 (&#36;krb5p...f4320028a648c94d209d772d88a161e0): Token length exception"<br />
<br />
I tried to cut the cipher to make it exactly 112 characters long (in which case the hashcat launches correctly) but obviously i get no result from this.<br />
<br />
What should i do?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Verizon Fios - wordlists]]></title>
			<link>https://hashcat.net/forum/thread-13493.html</link>
			<pubDate>Mon, 23 Feb 2026 12:17:14 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20197">samer59</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13493.html</guid>
			<description><![CDATA[Hi,<br />
I case anyone is interested. I have the most updated 3 - 7 letter wordlists for Verizon Fios routers. <br />
And 8 - 9 in next post.<br />
Here they are.<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1398" target="_blank" title="">5lista.txt</a> (Size: 21.32 KB / Downloads: 14)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1399" target="_blank" title="">4lista.txt</a> (Size: 28.89 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1400" target="_blank" title="">6lista.txt</a> (Size: 23.26 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1401" target="_blank" title="">3lista.txt</a> (Size: 7.23 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1402" target="_blank" title="">7lista.txt</a> (Size: 7.29 KB / Downloads: 6)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Hi,<br />
I case anyone is interested. I have the most updated 3 - 7 letter wordlists for Verizon Fios routers. <br />
And 8 - 9 in next post.<br />
Here they are.<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1398" target="_blank" title="">5lista.txt</a> (Size: 21.32 KB / Downloads: 14)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1399" target="_blank" title="">4lista.txt</a> (Size: 28.89 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1400" target="_blank" title="">6lista.txt</a> (Size: 23.26 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1401" target="_blank" title="">3lista.txt</a> (Size: 7.23 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1402" target="_blank" title="">7lista.txt</a> (Size: 7.29 KB / Downloads: 6)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[SNMPv3 engineID minimum length, am I missing something?]]></title>
			<link>https://hashcat.net/forum/thread-13492.html</link>
			<pubDate>Sat, 21 Feb 2026 17:45:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=24">c4p0ne</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13492.html</guid>
			<description><![CDATA[Regarding hashcat -m 25000 specifically but probably others too. So the question is about the<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>totoken.len_min[3] = 26</code></div></div><br />
in module_25000.c (and its siblings). RFC 3411 says engineID is 5-32 bytes, so the minimum should be 10 hex chars, not 26. IPv4-based engine IDs are 9 bytes (18 hex) and MAC-based are 11 bytes (22 hex). Well both of these appear to be under the floor.<br />
<br />
Also noticed m25000.pm uses<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>random_hex_string(26, 34)</code></div></div><br />
so the test suite never generates a short enough engineID to catch it. Is this a known limitation or an actual bug? Seems like a one-line fix across the all the sibling modules. Will someone knowledgeable please come to the rescue here and tell me if I'm looking at this wrong?]]></description>
			<content:encoded><![CDATA[Regarding hashcat -m 25000 specifically but probably others too. So the question is about the<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>totoken.len_min[3] = 26</code></div></div><br />
in module_25000.c (and its siblings). RFC 3411 says engineID is 5-32 bytes, so the minimum should be 10 hex chars, not 26. IPv4-based engine IDs are 9 bytes (18 hex) and MAC-based are 11 bytes (22 hex). Well both of these appear to be under the floor.<br />
<br />
Also noticed m25000.pm uses<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>random_hex_string(26, 34)</code></div></div><br />
so the test suite never generates a short enough engineID to catch it. Is this a known limitation or an actual bug? Seems like a one-line fix across the all the sibling modules. Will someone knowledgeable please come to the rescue here and tell me if I'm looking at this wrong?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Dictionary words are rejected before rules are applied for WPA2]]></title>
			<link>https://hashcat.net/forum/thread-13491.html</link>
			<pubDate>Fri, 20 Feb 2026 01:02:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20849">Merv</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13491.html</guid>
			<description><![CDATA[I'm looking into developing an attack for WPA2 hashes, and would love to get some pointers or suggestions for things I may have missed. <br />
<br />
My thinking is this so far, to use a small wordlist (<a href="https://weakpass.com/wordlists/hashmob.net_2025.small.found" target="_blank" rel="noopener" class="mycode_url">hashmob-small</a>) ~20MB, combined with a local to my country dictionary ~3MB with the <a href="https://notsosecure.com/one-rule-to-rule-them-all" target="_blank" rel="noopener" class="mycode_url">"one rule to rule them all"</a> rule set.<br />
<br />
However in testing I noticed a slight issue. Lets say the password we are trying to recover is "timmy666", and I have "timmy" in my wordlist, the ruleset will generate "timmy666", but the dictionary attack will skip over "timmy" as it is shorter than 8 characters, the minimum for WPA2. <br />
<br />
With this example we can see a word list with one word (timmy) in that generates 51995 guesses with the ruleset, but  100% rejected:  <br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>today (master) λ cat wordlist.txt<br />
timmy<br />
today (master) λ hashcat -a 0 -m 22000 -r rules.rule hash.txt wordlist.txt<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 PoCL 7.1  Linux, Release, RELOC, LLVM 20.1.8, SLEEF, DISTRO, CUDA, POCL_DEBUG) - Platform #1 [The pocl project]<br />
======================================================================================================================================<br />
* Device #01: cpu-haswell-Intel(R) Core(TM) i7-8650U CPU @ 1.90GHz, 5794/11588 MB (5794 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hashes: 1 digests; 1 unique digests, 1 unique salts<br />
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates<br />
Rules: 51995<br />
<br />
Optimizers applied:<br />
* Zero-Byte<br />
* Single-Hash<br />
* Single-Salt<br />
* Slow-Hash-SIMD-LOOP<br />
<br />
Watchdog: Temperature abort trigger set to 90c<br />
<br />
Host memory allocated for this attack: 514 MB (10083 MB free)<br />
<br />
Dictionary cache built:<br />
* Filename..: wordlist.txt<br />
* Passwords.: 1<br />
* Bytes.....: 6<br />
* Keyspace..: 51995<br />
* Runtime...: 0 secs<br />
<br />
Session..........: hashcat<br />
Status...........: Exhausted<br />
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)<br />
Hash.Target......: hash.txt<br />
Time.Started.....: Fri Feb 20 01:54:34 2026 (0 secs)<br />
Time.Estimated...: Fri Feb 20 01:54:34 2026 (0 secs)<br />
Kernel.Feature...: Pure Kernel (password length 8-63 bytes)<br />
Guess.Base.......: File (wordlist.txt)<br />
Guess.Mod........: Rules (rules.rule)<br />
Guess.Queue......: 1/1 (100.00%)<br />
Speed.#01........:        0 H/s (0.00ms) @ Accel:72 Loops:1024 Thr:1 Vec:8<br />
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)<br />
Progress.........: 51995/51995 (100.00%)<br />
Rejected.........: 51995/51995 (100.00%)<br />
Restore.Point....: 1/1 (100.00%)<br />
Restore.Sub.#01..: Salt:0 Amplifier:0-0 Iteration:0-1024<br />
Candidate.Engine.: Device Generator<br />
Candidates.#01...: [Copying]<br />
Hardware.Mon.#01.: Temp: 67c Util: 21%</blockquote>
<br />
I believe this is due to the word being less than 8 characters long and the mode being WPA2, as when I do the same thing with an MD5 hash I get 0% rejected. <br />
<br />
I did think of two work arounds. One would be to generate the dictionary file prior to running, but I don't know how large it would be, and storage is expensive and large dictionaries are a pain to deal with. <br />
<br />
The other would be to generate them and process in a pipe like so: <br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>hashcat --stdout -r OneRule.rule combined.txt | grep -E '^.{8,}&#36;' | uniq | hashcat -a 1 -m 22000 -w 4 hash.txt </blockquote>
<br />
But that seems slow and doesn't scale well. I'm hoping there is a better solution. <br />
<br />
Also if this is the wrong way to go about attacking WPA2 please do let me know! <br />
<br />
Thanks!]]></description>
			<content:encoded><![CDATA[I'm looking into developing an attack for WPA2 hashes, and would love to get some pointers or suggestions for things I may have missed. <br />
<br />
My thinking is this so far, to use a small wordlist (<a href="https://weakpass.com/wordlists/hashmob.net_2025.small.found" target="_blank" rel="noopener" class="mycode_url">hashmob-small</a>) ~20MB, combined with a local to my country dictionary ~3MB with the <a href="https://notsosecure.com/one-rule-to-rule-them-all" target="_blank" rel="noopener" class="mycode_url">"one rule to rule them all"</a> rule set.<br />
<br />
However in testing I noticed a slight issue. Lets say the password we are trying to recover is "timmy666", and I have "timmy" in my wordlist, the ruleset will generate "timmy666", but the dictionary attack will skip over "timmy" as it is shorter than 8 characters, the minimum for WPA2. <br />
<br />
With this example we can see a word list with one word (timmy) in that generates 51995 guesses with the ruleset, but  100% rejected:  <br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>today (master) λ cat wordlist.txt<br />
timmy<br />
today (master) λ hashcat -a 0 -m 22000 -r rules.rule hash.txt wordlist.txt<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 PoCL 7.1  Linux, Release, RELOC, LLVM 20.1.8, SLEEF, DISTRO, CUDA, POCL_DEBUG) - Platform #1 [The pocl project]<br />
======================================================================================================================================<br />
* Device #01: cpu-haswell-Intel(R) Core(TM) i7-8650U CPU @ 1.90GHz, 5794/11588 MB (5794 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hashes: 1 digests; 1 unique digests, 1 unique salts<br />
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates<br />
Rules: 51995<br />
<br />
Optimizers applied:<br />
* Zero-Byte<br />
* Single-Hash<br />
* Single-Salt<br />
* Slow-Hash-SIMD-LOOP<br />
<br />
Watchdog: Temperature abort trigger set to 90c<br />
<br />
Host memory allocated for this attack: 514 MB (10083 MB free)<br />
<br />
Dictionary cache built:<br />
* Filename..: wordlist.txt<br />
* Passwords.: 1<br />
* Bytes.....: 6<br />
* Keyspace..: 51995<br />
* Runtime...: 0 secs<br />
<br />
Session..........: hashcat<br />
Status...........: Exhausted<br />
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)<br />
Hash.Target......: hash.txt<br />
Time.Started.....: Fri Feb 20 01:54:34 2026 (0 secs)<br />
Time.Estimated...: Fri Feb 20 01:54:34 2026 (0 secs)<br />
Kernel.Feature...: Pure Kernel (password length 8-63 bytes)<br />
Guess.Base.......: File (wordlist.txt)<br />
Guess.Mod........: Rules (rules.rule)<br />
Guess.Queue......: 1/1 (100.00%)<br />
Speed.#01........:        0 H/s (0.00ms) @ Accel:72 Loops:1024 Thr:1 Vec:8<br />
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)<br />
Progress.........: 51995/51995 (100.00%)<br />
Rejected.........: 51995/51995 (100.00%)<br />
Restore.Point....: 1/1 (100.00%)<br />
Restore.Sub.#01..: Salt:0 Amplifier:0-0 Iteration:0-1024<br />
Candidate.Engine.: Device Generator<br />
Candidates.#01...: [Copying]<br />
Hardware.Mon.#01.: Temp: 67c Util: 21%</blockquote>
<br />
I believe this is due to the word being less than 8 characters long and the mode being WPA2, as when I do the same thing with an MD5 hash I get 0% rejected. <br />
<br />
I did think of two work arounds. One would be to generate the dictionary file prior to running, but I don't know how large it would be, and storage is expensive and large dictionaries are a pain to deal with. <br />
<br />
The other would be to generate them and process in a pipe like so: <br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>hashcat --stdout -r OneRule.rule combined.txt | grep -E '^.{8,}&#36;' | uniq | hashcat -a 1 -m 22000 -w 4 hash.txt </blockquote>
<br />
But that seems slow and doesn't scale well. I'm hoping there is a better solution. <br />
<br />
Also if this is the wrong way to go about attacking WPA2 please do let me know! <br />
<br />
Thanks!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Problem Extracting Hash from Captured WPA2 Handshake (M1-M2)]]></title>
			<link>https://hashcat.net/forum/thread-13490.html</link>
			<pubDate>Thu, 19 Feb 2026 20:31:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20848">unmed</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13490.html</guid>
			<description><![CDATA[Hi,<br />
<br />
I have a problem extracting Hashes from a WPA2 Handshake captured using Wireshark/TShark (not at the same time) by monitoring interface that was acting as an AP. I am using hcxpcapngtool but it does not seem to extract any hashes even though it seems to me that valid M1 and M2 from the 4-Way Handshake were captured. <br />
<br />
The Tool is giving me the following output:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hcxpcapngtool 6.3.5 reading from tshark.pcapng...<br />
<br />
summary capture file<br />
--------------------<br />
file name................................: tshark.pcapng<br />
version (pcapng).........................: 1.0<br />
operating system.........................: Linux 6.16.8+The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-amd64<br />
application..............................: Dumpcap (Wireshark) 4.6.3<br />
interface name...........................: wlan1<br />
interface vendor.........................: 000000<br />
openSSL version..........................: 1.1<br />
weak candidate...........................: N/A<br />
MAC ACCESS POINT.........................: 000000000000 (incremented on every new client)<br />
MAC CLIENT...............................: 000000000000<br />
REPLAYCOUNT..............................: 0<br />
ANONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
SNONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
timestamp minimum (timestamp)............: 19.02.2026 16:36:20 (1771518980)<br />
timestamp maximum (timestamp)............: 19.02.2026 16:36:23 (1771518983)<br />
duration of the dump tool (seconds)......: 3<br />
used capture interfaces..................: 1<br />
link layer header type...................: DLT_EN10MB (1)<br />
endianness (capture system)..............: little endian<br />
packets inside...........................: 8<br />
EAPOL ANONCE error corrections (NC)......: not detected<br />
<br />
<br />
session summary<br />
---------------<br />
processed pcapng files................: 1</code></div></div><br />
When looking in my capture I can see Message 1 and Message 2 Packets that belong together and have the Nonces set to valid values. I am attaching the capture because this was just a test not using real values (the password is password).<br />
<br />
Do you have any idea on what might be the problem?<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/zip.gif" title="ZIP File" border="0" alt=".zip" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1397" target="_blank" title="">tshark.zip</a> (Size: 873 bytes / Downloads: 1)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Hi,<br />
<br />
I have a problem extracting Hashes from a WPA2 Handshake captured using Wireshark/TShark (not at the same time) by monitoring interface that was acting as an AP. I am using hcxpcapngtool but it does not seem to extract any hashes even though it seems to me that valid M1 and M2 from the 4-Way Handshake were captured. <br />
<br />
The Tool is giving me the following output:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hcxpcapngtool 6.3.5 reading from tshark.pcapng...<br />
<br />
summary capture file<br />
--------------------<br />
file name................................: tshark.pcapng<br />
version (pcapng).........................: 1.0<br />
operating system.........................: Linux 6.16.8+The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-amd64<br />
application..............................: Dumpcap (Wireshark) 4.6.3<br />
interface name...........................: wlan1<br />
interface vendor.........................: 000000<br />
openSSL version..........................: 1.1<br />
weak candidate...........................: N/A<br />
MAC ACCESS POINT.........................: 000000000000 (incremented on every new client)<br />
MAC CLIENT...............................: 000000000000<br />
REPLAYCOUNT..............................: 0<br />
ANONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
SNONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
timestamp minimum (timestamp)............: 19.02.2026 16:36:20 (1771518980)<br />
timestamp maximum (timestamp)............: 19.02.2026 16:36:23 (1771518983)<br />
duration of the dump tool (seconds)......: 3<br />
used capture interfaces..................: 1<br />
link layer header type...................: DLT_EN10MB (1)<br />
endianness (capture system)..............: little endian<br />
packets inside...........................: 8<br />
EAPOL ANONCE error corrections (NC)......: not detected<br />
<br />
<br />
session summary<br />
---------------<br />
processed pcapng files................: 1</code></div></div><br />
When looking in my capture I can see Message 1 and Message 2 Packets that belong together and have the Nonces set to valid values. I am attaching the capture because this was just a test not using real values (the password is password).<br />
<br />
Do you have any idea on what might be the problem?<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/zip.gif" title="ZIP File" border="0" alt=".zip" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1397" target="_blank" title="">tshark.zip</a> (Size: 873 bytes / Downloads: 1)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
	</channel>
</rss>