<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - General Talk]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Thu, 14 May 2026 09:57:23 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Need help to open locked pdf]]></title>
			<link>https://hashcat.net/forum/thread-13603.html</link>
			<pubDate>Fri, 01 May 2026 06:22:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21127">Dim</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13603.html</guid>
			<description><![CDATA[Need help to open locked pdf<br />
Forgot Password]]></description>
			<content:encoded><![CDATA[Need help to open locked pdf<br />
Forgot Password]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Please Help !]]></title>
			<link>https://hashcat.net/forum/thread-13577.html</link>
			<pubDate>Mon, 06 Apr 2026 14:41:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21047">illusion147</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13577.html</guid>
			<description><![CDATA[Hi, <br />
<br />
I actually have a Crucial X10 Pro SSD, which I locked with a password using the "Crucial Portable SSD Utility" software. I believe this software from Crucial use a 256-bit encryption to lock the SSD. <br />
<br />
I know a couple of password options, is there any way you can help my use Hashcat for this software ? <br />
<br />
I have lot all my collection of pictures and vidoes of my dead grandfather who I was extremely close too, I was his only grandson. <br />
<br />
Grateful if anyone can help me ! <br />
<br />
Thanking you, <br />
Best regards, <br />
Ajay Shriram]]></description>
			<content:encoded><![CDATA[Hi, <br />
<br />
I actually have a Crucial X10 Pro SSD, which I locked with a password using the "Crucial Portable SSD Utility" software. I believe this software from Crucial use a 256-bit encryption to lock the SSD. <br />
<br />
I know a couple of password options, is there any way you can help my use Hashcat for this software ? <br />
<br />
I have lot all my collection of pictures and vidoes of my dead grandfather who I was extremely close too, I was his only grandson. <br />
<br />
Grateful if anyone can help me ! <br />
<br />
Thanking you, <br />
Best regards, <br />
Ajay Shriram]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[noob can anyone help]]></title>
			<link>https://hashcat.net/forum/thread-13567.html</link>
			<pubDate>Mon, 23 Mar 2026 16:00:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21002">ste980</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13567.html</guid>
			<description><![CDATA[this is what message i get when i try to run an attack<br />
<br />
C:\hashcat-7.1.2&gt;hashcat.exe -m 22000 output_hash.hc22000 -a 3 ?a?a?a?a?a?a?a?a?a?a<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) Graphics, 3543/7086 MB (1771 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hash 'output_hash.hc22000': Separator unmatched<br />
No hashes loaded.]]></description>
			<content:encoded><![CDATA[this is what message i get when i try to run an attack<br />
<br />
C:\hashcat-7.1.2&gt;hashcat.exe -m 22000 output_hash.hc22000 -a 3 ?a?a?a?a?a?a?a?a?a?a<br />
hashcat (v7.1.2) starting<br />
<br />
OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) Graphics, 3543/7086 MB (1771 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 8<br />
Maximum password length supported by kernel: 63<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hash 'output_hash.hc22000': Separator unmatched<br />
No hashes loaded.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Problem Extracting Hash from Captured WPA2 Handshake (M1-M2)]]></title>
			<link>https://hashcat.net/forum/thread-13490.html</link>
			<pubDate>Thu, 19 Feb 2026 20:31:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20848">unmed</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13490.html</guid>
			<description><![CDATA[Hi,<br />
<br />
I have a problem extracting Hashes from a WPA2 Handshake captured using Wireshark/TShark (not at the same time) by monitoring interface that was acting as an AP. I am using hcxpcapngtool but it does not seem to extract any hashes even though it seems to me that valid M1 and M2 from the 4-Way Handshake were captured. <br />
<br />
The Tool is giving me the following output:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hcxpcapngtool 6.3.5 reading from tshark.pcapng...<br />
<br />
summary capture file<br />
--------------------<br />
file name................................: tshark.pcapng<br />
version (pcapng).........................: 1.0<br />
operating system.........................: Linux 6.16.8+The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-amd64<br />
application..............................: Dumpcap (Wireshark) 4.6.3<br />
interface name...........................: wlan1<br />
interface vendor.........................: 000000<br />
openSSL version..........................: 1.1<br />
weak candidate...........................: N/A<br />
MAC ACCESS POINT.........................: 000000000000 (incremented on every new client)<br />
MAC CLIENT...............................: 000000000000<br />
REPLAYCOUNT..............................: 0<br />
ANONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
SNONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
timestamp minimum (timestamp)............: 19.02.2026 16:36:20 (1771518980)<br />
timestamp maximum (timestamp)............: 19.02.2026 16:36:23 (1771518983)<br />
duration of the dump tool (seconds)......: 3<br />
used capture interfaces..................: 1<br />
link layer header type...................: DLT_EN10MB (1)<br />
endianness (capture system)..............: little endian<br />
packets inside...........................: 8<br />
EAPOL ANONCE error corrections (NC)......: not detected<br />
<br />
<br />
session summary<br />
---------------<br />
processed pcapng files................: 1</code></div></div><br />
When looking in my capture I can see Message 1 and Message 2 Packets that belong together and have the Nonces set to valid values. I am attaching the capture because this was just a test not using real values (the password is password).<br />
<br />
Do you have any idea on what might be the problem?<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/zip.gif" title="ZIP File" border="0" alt=".zip" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1397" target="_blank" title="">tshark.zip</a> (Size: 873 bytes / Downloads: 1)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Hi,<br />
<br />
I have a problem extracting Hashes from a WPA2 Handshake captured using Wireshark/TShark (not at the same time) by monitoring interface that was acting as an AP. I am using hcxpcapngtool but it does not seem to extract any hashes even though it seems to me that valid M1 and M2 from the 4-Way Handshake were captured. <br />
<br />
The Tool is giving me the following output:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hcxpcapngtool 6.3.5 reading from tshark.pcapng...<br />
<br />
summary capture file<br />
--------------------<br />
file name................................: tshark.pcapng<br />
version (pcapng).........................: 1.0<br />
operating system.........................: Linux 6.16.8+The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-amd64<br />
application..............................: Dumpcap (Wireshark) 4.6.3<br />
interface name...........................: wlan1<br />
interface vendor.........................: 000000<br />
openSSL version..........................: 1.1<br />
weak candidate...........................: N/A<br />
MAC ACCESS POINT.........................: 000000000000 (incremented on every new client)<br />
MAC CLIENT...............................: 000000000000<br />
REPLAYCOUNT..............................: 0<br />
ANONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
SNONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000<br />
timestamp minimum (timestamp)............: 19.02.2026 16:36:20 (1771518980)<br />
timestamp maximum (timestamp)............: 19.02.2026 16:36:23 (1771518983)<br />
duration of the dump tool (seconds)......: 3<br />
used capture interfaces..................: 1<br />
link layer header type...................: DLT_EN10MB (1)<br />
endianness (capture system)..............: little endian<br />
packets inside...........................: 8<br />
EAPOL ANONCE error corrections (NC)......: not detected<br />
<br />
<br />
session summary<br />
---------------<br />
processed pcapng files................: 1</code></div></div><br />
When looking in my capture I can see Message 1 and Message 2 Packets that belong together and have the Nonces set to valid values. I am attaching the capture because this was just a test not using real values (the password is password).<br />
<br />
Do you have any idea on what might be the problem?<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/zip.gif" title="ZIP File" border="0" alt=".zip" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1397" target="_blank" title="">tshark.zip</a> (Size: 873 bytes / Downloads: 1)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[macOS Keychain Help]]></title>
			<link>https://hashcat.net/forum/thread-13480.html</link>
			<pubDate>Thu, 05 Feb 2026 18:24:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20807">Eldudderino</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13480.html</guid>
			<description><![CDATA[I have a 2013 iMac with 2 user accounts on it. I know the password for one user account, the other I do not. <br />
<br />
I obtain an image of the mac using CAINE. <br />
<br />
I was able to decrypt 632GB of data from that image. <br />
<br />
The user account that has the unknown password...can I obtain a password list from the various keychain databases? Or any useful information what so ever?]]></description>
			<content:encoded><![CDATA[I have a 2013 iMac with 2 user accounts on it. I know the password for one user account, the other I do not. <br />
<br />
I obtain an image of the mac using CAINE. <br />
<br />
I was able to decrypt 632GB of data from that image. <br />
<br />
The user account that has the unknown password...can I obtain a password list from the various keychain databases? Or any useful information what so ever?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[7-zip 11600 Cracking - Benchmark around 600 kH/s, real world around 28 kH/s (7z 7zip)]]></title>
			<link>https://hashcat.net/forum/thread-13473.html</link>
			<pubDate>Thu, 29 Jan 2026 04:36:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20780">postwar</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13473.html</guid>
			<description><![CDATA[Hashmode: 11600 - 7-Zip<br />
<br />
I am trying to crack a few 7-zip archives. Ironically I don't believe I created any of them to be 'uncrackable'. I incorrectly believed 7z was a weak cipher. I put these on a cloud provider and my threat model was I didn't want it to be the very first password that they tried (1234).<br />
<br />
I have not yet tried a dictionary derived from password leaks. It may be a password like "qwerty" (simple function/rule of a US keyboard), but it should not be a password like "letmein" (grammar rules of English). So I have not focused on using a leak dictionary.<br />
<br />
I have an RTX 3070. My benchmark is around 600 kH/s but in the real world it's around 28 kH/s = 28,000 hashes/second.<br />
<br />
Is anything close to 600 kH/s = 600,000 hashes/second possible on this hardware? I am on The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux and all my drivers seem to be working. I installed the 'everything' set in The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) so some convenience features (e.g. prebuilt dictionaries/rules) are included.<br />
<br />
I think my commands and methodology are correct because I already cracked one 7z this way. I tried some of the stuff in the FAQ about the gpu being too slow. I am mostly running a straight mask bruteforce (?l?d) but I've also tried generating a dictionary of attacks with mp32. I am very intrigued by the max character parameter. I believe my passwords probably do not have the same character more than once. The parameter in my version only allows a max of 2 or greater. I would love to set it to 2 or greater, or maybe process the dictionary.txt with another linux command to remove pointless lines.<br />
<br />
I have brute forced up to around 5 characters for plausible passwords. If I can do 600,000 H/s then I believe I can brute it. Otherwise I need to generate a much smaller key space.<br />
<br />
I also have several RX 470 mining GPUs but it would take some work to set them up.<br />
<br />
Creation dates of 7z I am cracking:<br />
2015-12-14<br />
2018-01-13<br />
2020-11-12<br />
<br />
Notably, it seems the pre-2019 files may use a weaker cryptography.<br />
<br />
<a href="https://sourceforge.net/p/sevenzip/bugs/2176/" target="_blank" rel="noopener" class="mycode_url">https://sourceforge.net/p/sevenzip/bugs/2176/</a><br />
<br />
My crypto knowledge is just the 101 level. I don't know how important this flaw is.<br />
<br />
Thanks for any help.]]></description>
			<content:encoded><![CDATA[Hashmode: 11600 - 7-Zip<br />
<br />
I am trying to crack a few 7-zip archives. Ironically I don't believe I created any of them to be 'uncrackable'. I incorrectly believed 7z was a weak cipher. I put these on a cloud provider and my threat model was I didn't want it to be the very first password that they tried (1234).<br />
<br />
I have not yet tried a dictionary derived from password leaks. It may be a password like "qwerty" (simple function/rule of a US keyboard), but it should not be a password like "letmein" (grammar rules of English). So I have not focused on using a leak dictionary.<br />
<br />
I have an RTX 3070. My benchmark is around 600 kH/s but in the real world it's around 28 kH/s = 28,000 hashes/second.<br />
<br />
Is anything close to 600 kH/s = 600,000 hashes/second possible on this hardware? I am on The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux and all my drivers seem to be working. I installed the 'everything' set in The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) so some convenience features (e.g. prebuilt dictionaries/rules) are included.<br />
<br />
I think my commands and methodology are correct because I already cracked one 7z this way. I tried some of the stuff in the FAQ about the gpu being too slow. I am mostly running a straight mask bruteforce (?l?d) but I've also tried generating a dictionary of attacks with mp32. I am very intrigued by the max character parameter. I believe my passwords probably do not have the same character more than once. The parameter in my version only allows a max of 2 or greater. I would love to set it to 2 or greater, or maybe process the dictionary.txt with another linux command to remove pointless lines.<br />
<br />
I have brute forced up to around 5 characters for plausible passwords. If I can do 600,000 H/s then I believe I can brute it. Otherwise I need to generate a much smaller key space.<br />
<br />
I also have several RX 470 mining GPUs but it would take some work to set them up.<br />
<br />
Creation dates of 7z I am cracking:<br />
2015-12-14<br />
2018-01-13<br />
2020-11-12<br />
<br />
Notably, it seems the pre-2019 files may use a weaker cryptography.<br />
<br />
<a href="https://sourceforge.net/p/sevenzip/bugs/2176/" target="_blank" rel="noopener" class="mycode_url">https://sourceforge.net/p/sevenzip/bugs/2176/</a><br />
<br />
My crypto knowledge is just the 101 level. I don't know how important this flaw is.<br />
<br />
Thanks for any help.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to use hashcat with JohnTheRipper "if needed" to recover a lost password .7z file]]></title>
			<link>https://hashcat.net/forum/thread-13472.html</link>
			<pubDate>Sat, 24 Jan 2026 21:36:06 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20771">youthmp</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13472.html</guid>
			<description><![CDATA[Hello there, I'm new on this area of security, and I've used some random characters with symbols and numbers to lock a .7z file. I've searched a lot but came to no conclusion. Can you please me guide me through if there is possible to recover this file or password or it is just lost? Thanks you very much for your help! EDIT: Note that I have am using windows 10 and I have a MSI RX6600 with a AMD ryzen 5 5600 6-Core Processor, if that helps. Thank you again.]]></description>
			<content:encoded><![CDATA[Hello there, I'm new on this area of security, and I've used some random characters with symbols and numbers to lock a .7z file. I've searched a lot but came to no conclusion. Can you please me guide me through if there is possible to recover this file or password or it is just lost? Thanks you very much for your help! EDIT: Note that I have am using windows 10 and I have a MSI RX6600 with a AMD ryzen 5 5600 6-Core Processor, if that helps. Thank you again.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Inquiry About Hashcat GPU Compute Service]]></title>
			<link>https://hashcat.net/forum/thread-13459.html</link>
			<pubDate>Thu, 08 Jan 2026 10:23:34 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20730">Dhayanithi</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13459.html</guid>
			<description><![CDATA[Hello Hashcat Team,<br />
I am interested in learning more about the Hashcat GPU Compute service. Could you please provide details on:<ul class="mycode_list"><li>Available GPU models (e.g., H100, A100, RTX 4090)<br />
</li>
<li>Pricing and billing structure (hourly or monthly)<br />
</li>
<li>Registration process and requirements<br />
</li>
<li>Any restrictions or policies for usage<br />
</li>
</ul>
My intended use is for authorized password recovery and security research. I would appreciate guidance on how to register and access the service.<br />
Thank you,<br />
Dhayanithi]]></description>
			<content:encoded><![CDATA[Hello Hashcat Team,<br />
I am interested in learning more about the Hashcat GPU Compute service. Could you please provide details on:<ul class="mycode_list"><li>Available GPU models (e.g., H100, A100, RTX 4090)<br />
</li>
<li>Pricing and billing structure (hourly or monthly)<br />
</li>
<li>Registration process and requirements<br />
</li>
<li>Any restrictions or policies for usage<br />
</li>
</ul>
My intended use is for authorized password recovery and security research. I would appreciate guidance on how to register and access the service.<br />
Thank you,<br />
Dhayanithi]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to create dictionary limit from 8 - 12 character]]></title>
			<link>https://hashcat.net/forum/thread-13423.html</link>
			<pubDate>Wed, 12 Nov 2025 07:25:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20572">dtthhoanglong</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13423.html</guid>
			<description><![CDATA[Hi, everyone. I want create a dictionary for method dictionary attack. But i don't know. How to create custom dictionary. Example i have some key: "dung, phuong, thao". I want create a dictionary combine from list key there with number and character as "@", and it limit from 8 - 12 character. How can i create it ? <br />
<br />
Example: dung1234, dungthao12@@, phuong124,thaodung44@]]></description>
			<content:encoded><![CDATA[Hi, everyone. I want create a dictionary for method dictionary attack. But i don't know. How to create custom dictionary. Example i have some key: "dung, phuong, thao". I want create a dictionary combine from list key there with number and character as "@", and it limit from 8 - 12 character. How can i create it ? <br />
<br />
Example: dung1234, dungthao12@@, phuong124,thaodung44@]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[word list]]></title>
			<link>https://hashcat.net/forum/thread-13418.html</link>
			<pubDate>Sun, 02 Nov 2025 15:18:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2248">msalman</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13418.html</guid>
			<description><![CDATA[hi friends can any one share with me updated word list the one from crackstation is updated in 2013 if anyone have big updated wordlist kindly share here thanks<br />
<br />
<a href="https://pasteboard.co/zcOkFcxfzujZ.png" target="_blank" rel="noopener" class="mycode_url">https://pasteboard.co/zcOkFcxfzujZ.png</a>]]></description>
			<content:encoded><![CDATA[hi friends can any one share with me updated word list the one from crackstation is updated in 2013 if anyone have big updated wordlist kindly share here thanks<br />
<br />
<a href="https://pasteboard.co/zcOkFcxfzujZ.png" target="_blank" rel="noopener" class="mycode_url">https://pasteboard.co/zcOkFcxfzujZ.png</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Password TP Link Archer C7]]></title>
			<link>https://hashcat.net/forum/thread-13417.html</link>
			<pubDate>Fri, 31 Oct 2025 21:50:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=16371">kuny1991</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13417.html</guid>
			<description><![CDATA[Hello everyone,<br />
I need to crack the password to my TP Link Archer C7. I am connected to wifi, but I don't know the password for the administration. The default was "admin".<br />
Do you have a tip on how to crack this, how to get the "handshake" for example?<br />
Thank you]]></description>
			<content:encoded><![CDATA[Hello everyone,<br />
I need to crack the password to my TP Link Archer C7. I am connected to wifi, but I don't know the password for the administration. The default was "admin".<br />
Do you have a tip on how to crack this, how to get the "handshake" for example?<br />
Thank you]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[winrar zip password]]></title>
			<link>https://hashcat.net/forum/thread-13291.html</link>
			<pubDate>Wed, 18 Jun 2025 10:13:44 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20229">jimmyq</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13291.html</guid>
			<description><![CDATA[hi guys i have an old file which ive forgot the password for its 43.6mb im new to all this can someone help me open the file please if so please pm thanks]]></description>
			<content:encoded><![CDATA[hi guys i have an old file which ive forgot the password for its 43.6mb im new to all this can someone help me open the file please if so please pm thanks]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[WannaCry recovery]]></title>
			<link>https://hashcat.net/forum/thread-12508.html</link>
			<pubDate>Thu, 13 Feb 2025 19:14:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=19440">TrowTrow</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-12508.html</guid>
			<description><![CDATA[Hello, <br />
<br />
A friend was affected by wannacry ransomware. <br />
Is it possible, using hashcat to recover the key used by the ransomware to cipher files. <br />
<br />
It appears that file which are same unciphered look the same when ciphered meaning no salt. <br />
It also seems to be AES 128. <br />
<br />
But which methodology should be the good one ? <br />
<br />
I have access to hundreds of RTX4090 to do the job if computational power matters. <br />
<br />
Thanks]]></description>
			<content:encoded><![CDATA[Hello, <br />
<br />
A friend was affected by wannacry ransomware. <br />
Is it possible, using hashcat to recover the key used by the ransomware to cipher files. <br />
<br />
It appears that file which are same unciphered look the same when ciphered meaning no salt. <br />
It also seems to be AES 128. <br />
<br />
But which methodology should be the good one ? <br />
<br />
I have access to hundreds of RTX4090 to do the job if computational power matters. <br />
<br />
Thanks]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[the speed drops after some time]]></title>
			<link>https://hashcat.net/forum/thread-12448.html</link>
			<pubDate>Thu, 02 Jan 2025 11:02:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=9929">svobodnui11</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-12448.html</guid>
			<description><![CDATA[Maybe it should be like that, but I'll ask the experts.<br />
<br />
When the dictionary attack starts, the speed is excellent, but after some time, I see that the speed drops by about 6 times, if it was 1.2 million per second, then the output will be about 240 thousand.<br />
<br />
maybe some additional options need to be written in the command or the dictionaries need to be optimized somehow, what do you advise.<br />
<br />
and yes, my dictionaries are from 10 GB and above, some are 80 GB]]></description>
			<content:encoded><![CDATA[Maybe it should be like that, but I'll ask the experts.<br />
<br />
When the dictionary attack starts, the speed is excellent, but after some time, I see that the speed drops by about 6 times, if it was 1.2 million per second, then the output will be about 240 thousand.<br />
<br />
maybe some additional options need to be written in the command or the dictionaries need to be optimized somehow, what do you advise.<br />
<br />
and yes, my dictionaries are from 10 GB and above, some are 80 GB]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Geth Ethereum Keystore password recovery]]></title>
			<link>https://hashcat.net/forum/thread-12439.html</link>
			<pubDate>Sat, 28 Dec 2024 20:04:59 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=19562">LowellChief</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-12439.html</guid>
			<description><![CDATA[Hello-  I have a small amount of Ethereum that I mined back in 2017-2018 using a GETH wallet I created.  I believe my wife accidently threw away my password that I wrote on a bill for this wallet.  I do have the keystore file backed up.<br />
<br />
I used this link to create my keystore hash<br />
<br />
<a href="https://stealthsploit.com/2017/06/12/ethereum-wallet-cracking/" target="_blank" rel="noopener" class="mycode_url">https://stealthsploit.com/2017/06/12/eth...-cracking/</a><br />
<br />
I set my txt file up in a similar way except I used "262144" instead of 1024 for the N value<br />
<br />
I created a password txt file using several combinations of passwords I used from back then<br />
<br />
I'm using hashcat 6.2.6 and windows 11<br />
<br />
I've opened a terminal in hashcat and tried a few of the commands I've found out there and added my hash.txt and password.txt in the line but just had a series of errors that do not work<br />
<br />
Honestly, I was able to build 4 ETh mining rigs but I have not a clue what I am doing in trying to crack this password.  <br />
<br />
Any suggestions on how I should enter my command line in hashcat?<br />
<br />
Thank you, LC]]></description>
			<content:encoded><![CDATA[Hello-  I have a small amount of Ethereum that I mined back in 2017-2018 using a GETH wallet I created.  I believe my wife accidently threw away my password that I wrote on a bill for this wallet.  I do have the keystore file backed up.<br />
<br />
I used this link to create my keystore hash<br />
<br />
<a href="https://stealthsploit.com/2017/06/12/ethereum-wallet-cracking/" target="_blank" rel="noopener" class="mycode_url">https://stealthsploit.com/2017/06/12/eth...-cracking/</a><br />
<br />
I set my txt file up in a similar way except I used "262144" instead of 1024 for the N value<br />
<br />
I created a password txt file using several combinations of passwords I used from back then<br />
<br />
I'm using hashcat 6.2.6 and windows 11<br />
<br />
I've opened a terminal in hashcat and tried a few of the commands I've found out there and added my hash.txt and password.txt in the line but just had a series of errors that do not work<br />
<br />
Honestly, I was able to build 4 ETh mining rigs but I have not a clue what I am doing in trying to crack this password.  <br />
<br />
Any suggestions on how I should enter my command line in hashcat?<br />
<br />
Thank you, LC]]></content:encoded>
		</item>
	</channel>
</rss>