<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - hashcat]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Thu, 14 May 2026 13:45:45 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Assistance needed: 7-Zip hash recovery (Static part known)]]></title>
			<link>https://hashcat.net/forum/thread-13613.html</link>
			<pubDate>Sat, 09 May 2026 05:36:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21159">nezabudu</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13613.html</guid>
			<description><![CDATA[<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Hi everyone,I need some help recovering the password for a personal family archive (7-Zip). </span></span></span><br />
</span><br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I’ve already done some work on my RTX 4060, but I’ve hit a wall and could use some more power.</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I have attached the file with the hash to this message.</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I have attached the hash file to this post.Password details:Static part (Known base): FBJKY33EBalabanov</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Estimated length: 18-22 characters.</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Estimated length: 18–22 characters.Potential variations: There is likely a typo in the middle or at the end. It might end with digits or special characters like !, &#36;, or letters (e.g., v1!, v1&#36;).Keyboard layout: There's a possibility it was typed using a Russian layout but with English characters (e.g., АИЛЛН33У instead of FBJKY33E).</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Important Note During my local brute-force, I found a collision: FBJKY33EBalabanovv1!</span></span></span></span><br />
<br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">But the archive does not open</span></span></span></span><br />
<br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I will be glad for any help</span></span></span></span><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1415" target="_blank" title="">hash.txt</a> (Size: 180.3 KB / Downloads: 5)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Hi everyone,I need some help recovering the password for a personal family archive (7-Zip). </span></span></span><br />
</span><br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I’ve already done some work on my RTX 4060, but I’ve hit a wall and could use some more power.</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I have attached the file with the hash to this message.</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I have attached the hash file to this post.Password details:Static part (Known base): FBJKY33EBalabanov</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Estimated length: 18-22 characters.</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Estimated length: 18–22 characters.Potential variations: There is likely a typo in the middle or at the end. It might end with digits or special characters like !, &#36;, or letters (e.g., v1!, v1&#36;).Keyboard layout: There's a possibility it was typed using a Russian layout but with English characters (e.g., АИЛЛН33У instead of FBJKY33E).</span></span></span></span><br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">Important Note During my local brute-force, I found a collision: FBJKY33EBalabanovv1!</span></span></span></span><br />
<br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">But the archive does not open</span></span></span></span><br />
<br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #000000;" class="mycode_color"><span style="font-family: Arial, sans-serif;" class="mycode_font">I will be glad for any help</span></span></span></span><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://hashcat.net/forum/images/attachtypes/txt.gif" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=1415" target="_blank" title="">hash.txt</a> (Size: 180.3 KB / Downloads: 5)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Could use help opening my old RAR]]></title>
			<link>https://hashcat.net/forum/thread-13604.html</link>
			<pubDate>Fri, 01 May 2026 11:19:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21128">Ubrobeer</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13604.html</guid>
			<description><![CDATA[While retrieving my old photo albums, I stumbled on a 1.56 GB RAR where me older photos are in. <br />
I am trying to crack the following Hash. <br />
<br />
&#36;RAR3&#36;*0*403707ca55b32e2c*9c5a6830c592342a454c9156382e4b75<br />
<br />
I did a run with a Rockyou list and a rockyou 30.000. Im a bit lost what is next. <br />
<br />
Im from the netherlands and i must have been 16-17 while i made this rar many years ago.<br />
Is there a good Dutch Rockyou list available or somebody with power that can help me?]]></description>
			<content:encoded><![CDATA[While retrieving my old photo albums, I stumbled on a 1.56 GB RAR where me older photos are in. <br />
I am trying to crack the following Hash. <br />
<br />
&#36;RAR3&#36;*0*403707ca55b32e2c*9c5a6830c592342a454c9156382e4b75<br />
<br />
I did a run with a Rockyou list and a rockyou 30.000. Im a bit lost what is next. <br />
<br />
Im from the netherlands and i must have been 16-17 while i made this rar many years ago.<br />
Is there a good Dutch Rockyou list available or somebody with power that can help me?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I'd like to open my password-protected zip file]]></title>
			<link>https://hashcat.net/forum/thread-13602.html</link>
			<pubDate>Thu, 30 Apr 2026 02:37:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21124">dimple</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13602.html</guid>
			<description><![CDATA[Hello everyone.<br />
I locked my zip password one year ago. And I am in need to open it now.<br />
But I can't remeber password of zip file. I should open that zip file for sure.<br />
Regarding my friend's words, hashcat would be helpful for me to crack my zip file.<br />
<br />
I just wanna get help even from admin, experts, but from legit, verified memebers<br />
<br />
Looking forward to your guys's help<br />
<br />
Best]]></description>
			<content:encoded><![CDATA[Hello everyone.<br />
I locked my zip password one year ago. And I am in need to open it now.<br />
But I can't remeber password of zip file. I should open that zip file for sure.<br />
Regarding my friend's words, hashcat would be helpful for me to crack my zip file.<br />
<br />
I just wanna get help even from admin, experts, but from legit, verified memebers<br />
<br />
Looking forward to your guys's help<br />
<br />
Best]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[1 Year Trying to Crack My 2013 Bitcoin Wallet — Need Expert Advice]]></title>
			<link>https://hashcat.net/forum/thread-13600.html</link>
			<pubDate>Wed, 29 Apr 2026 05:06:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21118">hsc_learner</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13600.html</guid>
			<description><![CDATA[<span style="color: #000000;" class="mycode_color">Hey everyone,</span><br />
<span style="color: #000000;" class="mycode_color"><br />
I’m looking for some guidance from those with experience in password recovery/cracking.<br />
For nearly a year, I’ve been trying to recover access to an old Bitcoin wallet (wallet.dat from 2013). I extracted the hash and have been attempting to crack it using an RTX 3060, but haven’t had any success so far.<br />
Recently, I discovered Vast.ai and was able to run jobs on more powerful GPUs (including an RTX 5090). I was hopeful this would make a difference, but unfortunately, I still haven’t had any luck.<br />
</span><br />
<span style="color: #000000;" class="mycode_color">So far, I’ve tried:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">Variations of old passwords I may have used</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Brute force with numeric ranges (0–10 digits)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Short brute-force masks (1–5 characters, all character sets)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Large wordlists (including weakpass and similar sources)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">At this point, I’m considering expanding brute-force attempts to longer character lengths, but I’m concerned about cost vs. benefit.<br />
I’d really appreciate advice on:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">The most efficient GPU(s) for this type of workload</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Cost-effective strategies (especially when using rented compute like Vast.ai)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Smarter approaches beyond pure brute force (mask strategies, rule-based attacks, etc.)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">Any tips or insights would be greatly appreciated.</span><br />
<span style="color: #000000;" class="mycode_color"><br />
Thanks in advance!<br />
</span>]]></description>
			<content:encoded><![CDATA[<span style="color: #000000;" class="mycode_color">Hey everyone,</span><br />
<span style="color: #000000;" class="mycode_color"><br />
I’m looking for some guidance from those with experience in password recovery/cracking.<br />
For nearly a year, I’ve been trying to recover access to an old Bitcoin wallet (wallet.dat from 2013). I extracted the hash and have been attempting to crack it using an RTX 3060, but haven’t had any success so far.<br />
Recently, I discovered Vast.ai and was able to run jobs on more powerful GPUs (including an RTX 5090). I was hopeful this would make a difference, but unfortunately, I still haven’t had any luck.<br />
</span><br />
<span style="color: #000000;" class="mycode_color">So far, I’ve tried:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">Variations of old passwords I may have used</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Brute force with numeric ranges (0–10 digits)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Short brute-force masks (1–5 characters, all character sets)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Large wordlists (including weakpass and similar sources)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">At this point, I’m considering expanding brute-force attempts to longer character lengths, but I’m concerned about cost vs. benefit.<br />
I’d really appreciate advice on:</span><ul class="mycode_list"><li><span style="color: #000000;" class="mycode_color">The most efficient GPU(s) for this type of workload</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Cost-effective strategies (especially when using rented compute like Vast.ai)</span><br />
</li>
<li><span style="color: #000000;" class="mycode_color">Smarter approaches beyond pure brute force (mask strategies, rule-based attacks, etc.)</span><br />
</li>
</ul>
<br />
<span style="color: #000000;" class="mycode_color">Any tips or insights would be greatly appreciated.</span><br />
<span style="color: #000000;" class="mycode_color"><br />
Thanks in advance!<br />
</span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Password Length Limitation?]]></title>
			<link>https://hashcat.net/forum/thread-13594.html</link>
			<pubDate>Mon, 20 Apr 2026 11:49:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21081">StumblingAlong</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13594.html</guid>
			<description><![CDATA[Hello All,<br />
<br />
Hashcat noob here, been trying for a couple of days to find a password for a .7z file I created and forgot the password for, so far with no success so it's time to ask for some help.<br />
<br />
The password I believe is 25 characters in length, the first 20 of which are lower case letters, and the last 5 are numbers.<br />
I'm sure I have the letters and their order correct but can't remember what order and exactly what the last 5 numbers are supposed to be.<br />
<br />
I've used The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) and John the Ripper to get the hash, and I'm trying to figure out how to find the password from that hash by entering the letters I already know and I'm hoping hashcat can find the 5 numbers I can't remember.<br />
<br />
Tried lots of things that I don't really understand and so far the only way I've been able to get hashcat to run on the hashfile is by either:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 3 -m 11600 hashcat.txt</code></div></div>or<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 0 -m 11600 hashcat.txt</code></div></div><br />
With hashcat.txt being the file the hash is in.<br />
I did remove the filename (1.7z) from the start of the hash John the Ripper gave before trying anything with hashcat, which I think I was supposed to, so now the hash starts with &#36;7z... instead of 1.7z:&#36;7z...<br />
The hash is 1074 characters.<br />
<br />
If I try to use the Hybrid Wordlist + Mask option it always fails, if I try anything but the above commands it seems to fail.<br />
While those above do seem to be working, I figure the process might be still running when the universe ends and the last star burns out, which is why I'm wanting to know if it's possible to somehow tell hashcat the characters I already know and just have it try to find the remaining 5 numbers I can't remember?<br />
<br />
I tried setting the -O option so it wasn't maxing out the CPU on my old clunker and got a message about too many characters for the password, maximum of 20 I think it said.<br />
Without the -O option I think it said there was a maximum password characters of 256.<br />
<br />
I've been reading stuff and watching tutorials etc. but not getting anywhere.<br />
One result I remember from searching claimed hashcat could only find passwords of a certain length or under, so instead of wasting more time and getting nowhere I thought I'd ask people who know these things.<br />
<br />
Thanks<br />
<br />
P.S. I see when previewing this post the forum software edits my post to include words I did not type when I mentioned that Distro?<br />
What's the deal with that?]]></description>
			<content:encoded><![CDATA[Hello All,<br />
<br />
Hashcat noob here, been trying for a couple of days to find a password for a .7z file I created and forgot the password for, so far with no success so it's time to ask for some help.<br />
<br />
The password I believe is 25 characters in length, the first 20 of which are lower case letters, and the last 5 are numbers.<br />
I'm sure I have the letters and their order correct but can't remember what order and exactly what the last 5 numbers are supposed to be.<br />
<br />
I've used The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) and John the Ripper to get the hash, and I'm trying to figure out how to find the password from that hash by entering the letters I already know and I'm hoping hashcat can find the 5 numbers I can't remember.<br />
<br />
Tried lots of things that I don't really understand and so far the only way I've been able to get hashcat to run on the hashfile is by either:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 3 -m 11600 hashcat.txt</code></div></div>or<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -a 0 -m 11600 hashcat.txt</code></div></div><br />
With hashcat.txt being the file the hash is in.<br />
I did remove the filename (1.7z) from the start of the hash John the Ripper gave before trying anything with hashcat, which I think I was supposed to, so now the hash starts with &#36;7z... instead of 1.7z:&#36;7z...<br />
The hash is 1074 characters.<br />
<br />
If I try to use the Hybrid Wordlist + Mask option it always fails, if I try anything but the above commands it seems to fail.<br />
While those above do seem to be working, I figure the process might be still running when the universe ends and the last star burns out, which is why I'm wanting to know if it's possible to somehow tell hashcat the characters I already know and just have it try to find the remaining 5 numbers I can't remember?<br />
<br />
I tried setting the -O option so it wasn't maxing out the CPU on my old clunker and got a message about too many characters for the password, maximum of 20 I think it said.<br />
Without the -O option I think it said there was a maximum password characters of 256.<br />
<br />
I've been reading stuff and watching tutorials etc. but not getting anywhere.<br />
One result I remember from searching claimed hashcat could only find passwords of a certain length or under, so instead of wasting more time and getting nowhere I thought I'd ask people who know these things.<br />
<br />
Thanks<br />
<br />
P.S. I see when previewing this post the forum software edits my post to include words I did not type when I mentioned that Distro?<br />
What's the deal with that?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[multi GPUs configuration/overclocking]]></title>
			<link>https://hashcat.net/forum/thread-13593.html</link>
			<pubDate>Fri, 17 Apr 2026 17:48:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20997">kryptyk</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13593.html</guid>
			<description><![CDATA[Hi there,<br />
I am wandering if anybody can share tips on configuration/overclocking of a multi GPU rig running nvidia GPUs in an Ubuntu Linux environment to improve performance or enhance hash-rate with hashcat?<br />
I have it running smoothly, but I think I could speed things up a little by overclocking.<br />
Any tips or link to tutorials will be appreciated.<br />
Many thanks.<br />
<br />
\m/~ (&gt;_&lt;) ~\m/]]></description>
			<content:encoded><![CDATA[Hi there,<br />
I am wandering if anybody can share tips on configuration/overclocking of a multi GPU rig running nvidia GPUs in an Ubuntu Linux environment to improve performance or enhance hash-rate with hashcat?<br />
I have it running smoothly, but I think I could speed things up a little by overclocking.<br />
Any tips or link to tutorials will be appreciated.<br />
Many thanks.<br />
<br />
\m/~ (&gt;_&lt;) ~\m/]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[trying to learn hashcat]]></title>
			<link>https://hashcat.net/forum/thread-13583.html</link>
			<pubDate>Tue, 14 Apr 2026 21:15:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21059">ari2asem</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13583.html</guid>
			<description><![CDATA[first of all.....this is learning project for me<br />
<br />
situation is next:<br />
<br />
 - i have multivolume RAR-files (part01, part02.....part11)<br />
 - it has hash format 12500 rar3-hp<br />
 - i know the password (lower alpha and numeric). i can unrar the archive. so i am not after the password, but trying to learn the use of hashcat.<br />
 - i made wordlist of 430 different entries with lower-alpha and numbers. <br />
<br />
hashcat can't recover my password.<br />
<br />
command is<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code> &gt;hashcat.exe -a 0 -m 12500 -w 3 -S --session=tmp62B7 --potfile-disable -p : --hwmon-temp-abort=75 -o "C:&#92;Users&#92;xxxx&#92;Downloads&#92;hashcat-7.1.2&#92;output.txt" --outfile-format=1,2 "C:&#92;Users&#92;xxxx&#92;AppData&#92;Local&#92;Temp&#92;tmp62B7.tmp" "C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt"<br />
hashcat (v7.1.2) starting - session [tmp62B7]</code></div></div><br />
<br />
and this the result of the running session<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) UHD Graphics 730, 15122/30244 MB (2047 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 0<br />
Maximum password length supported by kernel: 128<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hashes: 1 digests; 1 unique digests, 1 unique salts<br />
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates<br />
Rules: 1<br />
<br />
Optimizers applied:<br />
* Zero-Byte<br />
* Single-Hash<br />
* Single-Salt<br />
<br />
ATTENTION! Pure (unoptimized) backend kernels selected.<br />
Pure kernels can crack longer passwords, but drastically reduce performance.<br />
If you want to switch to optimized kernels, append -O to your commandline.<br />
See the above message to find out about the exact limits.<br />
<br />
Watchdog: Hardware monitoring interface not found on your system.<br />
Watchdog: Temperature abort trigger disabled.<br />
<br />
Host memory allocated for this attack: 2775 MB (53141 MB free)<br />
<br />
Dictionary cache built:<br />
* Filename..: C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt<br />
* Passwords.: 430<br />
* Bytes.....: 5986<br />
* Keyspace..: 430<br />
* Runtime...: 0 secs<br />
<br />
Approaching final keyspace - workload adjusted.<br />
<br />
Session..........: tmp62B7<br />
Status...........: Exhausted<br />
Hash.Mode........: 12500 (RAR3-hp)<br />
Hash.Target......: &#36;RAR3&#36;*0*9f54??????*4ba4e??????????<br />
Time.Started.....: Tue Apr 14 22:49:43 2026 (5 secs)<br />
Time.Estimated...: Tue Apr 14 22:49:48 2026 (0 secs)<br />
Kernel.Feature...: Pure Kernel (password length 0-128 bytes)<br />
Guess.Base.......: File (C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt)<br />
Guess.Queue......: 1/1 (100.00%)<br />
Speed.#01........:      110 H/s (116.88ms) @ Accel:1 Loops:16384 Thr:36 Vec:1<br />
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)<br />
Progress.........: 430/430 (100.00%)<br />
Rejected.........: 0/430 (0.00%)<br />
Restore.Point....: 430/430 (100.00%)<br />
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:245760-262144<br />
Candidate.Engine.: Host Generator + PCIe<br />
Candidates.#01...: test8227768 -&gt; test9993139<br />
<br />
Started: Tue Apr 14 22:49:37 2026<br />
Stopped: Tue Apr 14 22:49:49 2026</code></div></div><br />
WinRAR info says<span style="font-weight: bold;" class="mycode_b"> "RAR 4.x Volume, data and names encrypted".</span><br />
<br />
what am i doing wrong?<br />
why can't hashcat find the password which is in the wordlist?]]></description>
			<content:encoded><![CDATA[first of all.....this is learning project for me<br />
<br />
situation is next:<br />
<br />
 - i have multivolume RAR-files (part01, part02.....part11)<br />
 - it has hash format 12500 rar3-hp<br />
 - i know the password (lower alpha and numeric). i can unrar the archive. so i am not after the password, but trying to learn the use of hashcat.<br />
 - i made wordlist of 430 different entries with lower-alpha and numbers. <br />
<br />
hashcat can't recover my password.<br />
<br />
command is<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code> &gt;hashcat.exe -a 0 -m 12500 -w 3 -S --session=tmp62B7 --potfile-disable -p : --hwmon-temp-abort=75 -o "C:&#92;Users&#92;xxxx&#92;Downloads&#92;hashcat-7.1.2&#92;output.txt" --outfile-format=1,2 "C:&#92;Users&#92;xxxx&#92;AppData&#92;Local&#92;Temp&#92;tmp62B7.tmp" "C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt"<br />
hashcat (v7.1.2) starting - session [tmp62B7]</code></div></div><br />
<br />
and this the result of the running session<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]<br />
=============================================================<br />
* Device #01: Intel(R) UHD Graphics 730, 15122/30244 MB (2047 MB allocatable), 8MCU<br />
<br />
Minimum password length supported by kernel: 0<br />
Maximum password length supported by kernel: 128<br />
Minimum salt length supported by kernel: 0<br />
Maximum salt length supported by kernel: 256<br />
<br />
Hashes: 1 digests; 1 unique digests, 1 unique salts<br />
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates<br />
Rules: 1<br />
<br />
Optimizers applied:<br />
* Zero-Byte<br />
* Single-Hash<br />
* Single-Salt<br />
<br />
ATTENTION! Pure (unoptimized) backend kernels selected.<br />
Pure kernels can crack longer passwords, but drastically reduce performance.<br />
If you want to switch to optimized kernels, append -O to your commandline.<br />
See the above message to find out about the exact limits.<br />
<br />
Watchdog: Hardware monitoring interface not found on your system.<br />
Watchdog: Temperature abort trigger disabled.<br />
<br />
Host memory allocated for this attack: 2775 MB (53141 MB free)<br />
<br />
Dictionary cache built:<br />
* Filename..: C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt<br />
* Passwords.: 430<br />
* Bytes.....: 5986<br />
* Keyspace..: 430<br />
* Runtime...: 0 secs<br />
<br />
Approaching final keyspace - workload adjusted.<br />
<br />
Session..........: tmp62B7<br />
Status...........: Exhausted<br />
Hash.Mode........: 12500 (RAR3-hp)<br />
Hash.Target......: &#36;RAR3&#36;*0*9f54??????*4ba4e??????????<br />
Time.Started.....: Tue Apr 14 22:49:43 2026 (5 secs)<br />
Time.Estimated...: Tue Apr 14 22:49:48 2026 (0 secs)<br />
Kernel.Feature...: Pure Kernel (password length 0-128 bytes)<br />
Guess.Base.......: File (C:&#92;Users&#92;xxxx&#92;Downloads&#92;random-wordlist-generator-portable&#92;nieuw.2.txt)<br />
Guess.Queue......: 1/1 (100.00%)<br />
Speed.#01........:      110 H/s (116.88ms) @ Accel:1 Loops:16384 Thr:36 Vec:1<br />
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)<br />
Progress.........: 430/430 (100.00%)<br />
Rejected.........: 0/430 (0.00%)<br />
Restore.Point....: 430/430 (100.00%)<br />
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:245760-262144<br />
Candidate.Engine.: Host Generator + PCIe<br />
Candidates.#01...: test8227768 -&gt; test9993139<br />
<br />
Started: Tue Apr 14 22:49:37 2026<br />
Stopped: Tue Apr 14 22:49:49 2026</code></div></div><br />
WinRAR info says<span style="font-weight: bold;" class="mycode_b"> "RAR 4.x Volume, data and names encrypted".</span><br />
<br />
what am i doing wrong?<br />
why can't hashcat find the password which is in the wordlist?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Need help recovering DiskCryptor password - first time user]]></title>
			<link>https://hashcat.net/forum/thread-13582.html</link>
			<pubDate>Tue, 14 Apr 2026 15:19:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21067">system</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13582.html</guid>
			<description><![CDATA[Hi everyone,<br />
<br />
I am a first-time user and I need some help recovering access to an encrypted partition on my Windows 11 computer.<br />
<br />
Here is my situation:<br />
- I encrypted a partition using DiskCryptor 1.3 Beta<br />
- The partition is [internal/external, size if known]<br />
- I have forgotten the password and cannot access the partition<br />
- I do NOT have a backup of the header (if true)<br />
- I am not experienced with hashcat or password recovery tools<br />
- This is my own computer and my own data<br />
<br />
I have already downloaded:<br />
- Hashcat 7.1.2<br />
- John the Ripper 1.9.0 Jumbo (Windows 64-bit)<br />
<br />
<br />
Any help would be greatly appreciated. I just want to recover access to my own files.<br />
<br />
Thank you in advance]]></description>
			<content:encoded><![CDATA[Hi everyone,<br />
<br />
I am a first-time user and I need some help recovering access to an encrypted partition on my Windows 11 computer.<br />
<br />
Here is my situation:<br />
- I encrypted a partition using DiskCryptor 1.3 Beta<br />
- The partition is [internal/external, size if known]<br />
- I have forgotten the password and cannot access the partition<br />
- I do NOT have a backup of the header (if true)<br />
- I am not experienced with hashcat or password recovery tools<br />
- This is my own computer and my own data<br />
<br />
I have already downloaded:<br />
- Hashcat 7.1.2<br />
- John the Ripper 1.9.0 Jumbo (Windows 64-bit)<br />
<br />
<br />
Any help would be greatly appreciated. I just want to recover access to my own files.<br />
<br />
Thank you in advance]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I hit what looks like a Hashcat/ ssh2john format mismatch in the SSH key passphrase l]]></title>
			<link>https://hashcat.net/forum/thread-13579.html</link>
			<pubDate>Thu, 09 Apr 2026 18:15:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21057">misskarriew</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13579.html</guid>
			<description><![CDATA[I hit what looks like a Hashcat/<br />
ssh2john<br />
format mismatch in the SSH key passphrase lab.<br />
id_rsa<br />
is valid now — <br />
ssh-keygen -y -f id_rsa<br />
prompts for the passphrase.<br />
I extracted with:<br />
<br />
ssh2john id_rsa &gt; ssh.hash<br />
<br />
ssh.hash<br />
is one clean line starting with:<br />
<br />
id_rsa:&#36;sshng&#36;6&#36;16&#36;...<br />
<br />
But Hashcat <br />
v7.1.2<br />
rejects it:<br />
<br />
hashcat -m 22921 ssh.hash ssh.passwords -r ssh.rule<br />
<br />
Error:<br />
<br />
Token length exception<br />
No hashes loaded<br />
<br />
And:<br />
<br />
hashcat --identify ssh.hash<br />
<br />
returns:<br />
<br />
No hash-mode matches the structure of the input hash.<br />
<br />
Has anyone seen this with newer OpenSSH <br />
&#36;sshng&#36;6&#36;16&#36;...<br />
hashes? Is mode <br />
22921<br />
currently incompatible with <br />
ssh2john<br />
output here, or is there a different extractor/workflow I should be using?]]></description>
			<content:encoded><![CDATA[I hit what looks like a Hashcat/<br />
ssh2john<br />
format mismatch in the SSH key passphrase lab.<br />
id_rsa<br />
is valid now — <br />
ssh-keygen -y -f id_rsa<br />
prompts for the passphrase.<br />
I extracted with:<br />
<br />
ssh2john id_rsa &gt; ssh.hash<br />
<br />
ssh.hash<br />
is one clean line starting with:<br />
<br />
id_rsa:&#36;sshng&#36;6&#36;16&#36;...<br />
<br />
But Hashcat <br />
v7.1.2<br />
rejects it:<br />
<br />
hashcat -m 22921 ssh.hash ssh.passwords -r ssh.rule<br />
<br />
Error:<br />
<br />
Token length exception<br />
No hashes loaded<br />
<br />
And:<br />
<br />
hashcat --identify ssh.hash<br />
<br />
returns:<br />
<br />
No hash-mode matches the structure of the input hash.<br />
<br />
Has anyone seen this with newer OpenSSH <br />
&#36;sshng&#36;6&#36;16&#36;...<br />
hashes? Is mode <br />
22921<br />
currently incompatible with <br />
ssh2john<br />
output here, or is there a different extractor/workflow I should be using?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[noob needs help]]></title>
			<link>https://hashcat.net/forum/thread-13578.html</link>
			<pubDate>Thu, 09 Apr 2026 07:07:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21053">idek</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13578.html</guid>
			<description><![CDATA[help this keeps showing]]></description>
			<content:encoded><![CDATA[help this keeps showing]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I can't get it to work]]></title>
			<link>https://hashcat.net/forum/thread-13575.html</link>
			<pubDate>Thu, 02 Apr 2026 06:25:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=21032">Ricybily</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13575.html</guid>
			<description><![CDATA[I've been trying many methods to get it working since it all started when I first installed it on my Windows 10 machine with a 5050. When I try to use Hashcat, it tells me I need compatible drivers and that I need to change them. I followed the entire process to change the drivers on the website, and when I finally manage to install them, it starts giving this error and I can't get past it.<img src="https://pasteboard.co/8qgpSWwoglKP.png" loading="lazy"  alt="[Image: 8qgpSWwoglKP.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[I've been trying many methods to get it working since it all started when I first installed it on my Windows 10 machine with a 5050. When I try to use Hashcat, it tells me I need compatible drivers and that I need to change them. I followed the entire process to change the drivers on the website, and when I finally manage to install them, it starts giving this error and I can't get past it.<img src="https://pasteboard.co/8qgpSWwoglKP.png" loading="lazy"  alt="[Image: 8qgpSWwoglKP.png]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A question on logic and approaches to cracking]]></title>
			<link>https://hashcat.net/forum/thread-13566.html</link>
			<pubDate>Sat, 21 Mar 2026 22:52:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20997">kryptyk</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13566.html</guid>
			<description><![CDATA[Hi all,<br />
I am pretty new to hashcat, so please forgive me if I am missing the obvious.<br />
<br />
I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting.<br />
<br />
 I have tried:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a?a?a?a?a?a?a &lt;- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results.<br />
<br />
<br />
With no luck. I tried just finding out the first two characters alone:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a also no results.<br />
<br />
But got some warning about now giving hashcat enough work, however it found nothing...<br />
Maybe I am missing something obvious?<br />
<br />
Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces)  in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward.<br />
<br />
Is that logic correct in your experience?<br />
<br />
Thank you.]]></description>
			<content:encoded><![CDATA[Hi all,<br />
I am pretty new to hashcat, so please forgive me if I am missing the obvious.<br />
<br />
I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting.<br />
<br />
 I have tried:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a?a?a?a?a?a?a &lt;- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results.<br />
<br />
<br />
With no luck. I tried just finding out the first two characters alone:<br />
<br />
./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a also no results.<br />
<br />
But got some warning about now giving hashcat enough work, however it found nothing...<br />
Maybe I am missing something obvious?<br />
<br />
Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces)  in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward.<br />
<br />
Is that logic correct in your experience?<br />
<br />
Thank you.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Help with code]]></title>
			<link>https://hashcat.net/forum/thread-13565.html</link>
			<pubDate>Sat, 21 Mar 2026 15:17:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20999">LittleElla</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13565.html</guid>
			<description><![CDATA[Hello!<br />
I'm new here and I was just trying to use Hashcat to get my password back.<br />
It is a rar file and I know part of the password. <br />
This line bellow is from the code I was trying to run with CMD (I already have the hash):<br />
<br />
<span style="font-weight: bold;" class="mycode_b">hashcat.exe -m 13000 -a3 hash 321654?s?s?s</span><br />
<br />
The point is, I know it starts with "321654," and the last three characters are somewhere in this sequence: /?1!2@3#.<br />
<br />
Can anybody help me please?]]></description>
			<content:encoded><![CDATA[Hello!<br />
I'm new here and I was just trying to use Hashcat to get my password back.<br />
It is a rar file and I know part of the password. <br />
This line bellow is from the code I was trying to run with CMD (I already have the hash):<br />
<br />
<span style="font-weight: bold;" class="mycode_b">hashcat.exe -m 13000 -a3 hash 321654?s?s?s</span><br />
<br />
The point is, I know it starts with "321654," and the last three characters are somewhere in this sequence: /?1!2@3#.<br />
<br />
Can anybody help me please?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cracking Protected Text HTML]]></title>
			<link>https://hashcat.net/forum/thread-13563.html</link>
			<pubDate>Thu, 19 Mar 2026 22:25:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20991">qazmit</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13563.html</guid>
			<description><![CDATA[Hi<br />
<br />
Firsly, I am a complete Hashcat newbie so I know nothing about how to use it.<br />
<br />
A while ago, I copied to my hard drive the HTML page for a Protected Text page from protectedtext.com. Unfortunately, I have forgotten the password for it.<br />
<br />
Please can you give me step-by-step instructions for using Hashcat to crack the HTML page that I downloaded.<br />
<br />
I am halfway proficient at Javascript so I may or may not be able to make alterations to the Protected Text Javascript if necessary.<br />
<br />
Thank you very much]]></description>
			<content:encoded><![CDATA[Hi<br />
<br />
Firsly, I am a complete Hashcat newbie so I know nothing about how to use it.<br />
<br />
A while ago, I copied to my hard drive the HTML page for a Protected Text page from protectedtext.com. Unfortunately, I have forgotten the password for it.<br />
<br />
Please can you give me step-by-step instructions for using Hashcat to crack the HTML page that I downloaded.<br />
<br />
I am halfway proficient at Javascript so I may or may not be able to make alterations to the Protected Text Javascript if necessary.<br />
<br />
Thank you very much]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Configuring checkpoint timer to save progress]]></title>
			<link>https://hashcat.net/forum/thread-13557.html</link>
			<pubDate>Tue, 17 Mar 2026 16:45:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=20985">sherlock</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-13557.html</guid>
			<description><![CDATA[Can someone please help me understand how to use checkpoint timers to save progress so that i can continue to run from the previous checkpoint after closing the program.<br />
I am new to using Hashcat and I tried to find something like a syntax or keywords guide, but couldn't find anything helpful. Thank you for reading this.]]></description>
			<content:encoded><![CDATA[Can someone please help me understand how to use checkpoint timers to save progress so that i can continue to run from the previous checkpoint after closing the program.<br />
I am new to using Hashcat and I tried to find something like a syntax or keywords guide, but couldn't find anything helpful. Thank you for reading this.]]></content:encoded>
		</item>
	</channel>
</rss>