<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - General Help]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Sun, 17 May 2026 09:28:17 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[AIX {ssha256} and {ssha512} hash algo ?]]></title>
			<link>https://hashcat.net/forum/thread-5555.html</link>
			<pubDate>Wed, 29 Jun 2016 07:41:01 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8081">fanf</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5555.html</guid>
			<description><![CDATA[Hello, <br />
 <br />
I'm trying to learn how the AIX implementation for ssha256 / ssha512 differs from the standard algo described in <a href="ftp://ftp.arlut.utexas.edu/pub/java_hashes/SHA-crypt.txt" target="_blank" rel="noopener" class="mycode_url">ftp://ftp.arlut.utexas.edu/pub/java_hash...-crypt.txt</a> (my goal is to be able to generate valid hash from a java app). <br />
<br />
I saw that you discussed the subject a lot 3 years ago (<a href="https://hashcat.net/forum/thread-2247.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-2247.html</a>).  So I was wondering if you would help about the details of the algo. <br />
<br />
Any help or pointer to resources on the subject would be much appreciated. <br />
<br />
Thanks,]]></description>
			<content:encoded><![CDATA[Hello, <br />
 <br />
I'm trying to learn how the AIX implementation for ssha256 / ssha512 differs from the standard algo described in <a href="ftp://ftp.arlut.utexas.edu/pub/java_hashes/SHA-crypt.txt" target="_blank" rel="noopener" class="mycode_url">ftp://ftp.arlut.utexas.edu/pub/java_hash...-crypt.txt</a> (my goal is to be able to generate valid hash from a java app). <br />
<br />
I saw that you discussed the subject a lot 3 years ago (<a href="https://hashcat.net/forum/thread-2247.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-2247.html</a>).  So I was wondering if you would help about the details of the algo. <br />
<br />
Any help or pointer to resources on the subject would be much appreciated. <br />
<br />
Thanks,]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Auto login performance benefits]]></title>
			<link>https://hashcat.net/forum/thread-5550.html</link>
			<pubDate>Sun, 26 Jun 2016 00:01:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=5143">devilsadvocate</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5550.html</guid>
			<description><![CDATA[Is there any particular reason that the Auto Login section was removed from the Linux Server how to?<br />
<br />
<a href="https://hashcat.net/wiki/doku.php?id=linux_server_howto" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/wiki/doku.php?id=linux_server_howto</a><br />
<br />
I am still running Ubuntu 14.04 and recently upgraded the driver from 14.09 to 15.12<br />
<br />
I had my /etc/lightdm/lightdm.conf file set up like this (per the former instructions).<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>greeter-session=unity-greeter<br />
user-session=openbox<br />
autologin-user=YOUR_USERNAME<br />
autologin-user-timeout=0</code></div></div><br />
As an experiment, I took the above lines out of /etc/lightdm/lightdm.conf to make my display available again on my monitor.  Taking these lines out resulted in a noticeable performance drop in passwords per second when testing with WPA2 (probably due to having to drive a monitor).<br />
<br />
I am running a 295X2 on Ubuntu 14.04 and was getting around 330,000 passwords per second with the 14.9 Catalyst Driver when connected to my machine over ssh.  I decided to upgrade the driver to 15.12 and had auto login disabled when I ran my next performance benchmark.  It was topping out at around 275,000 keys/passwords per second, a noticeable drop.<br />
<br />
Next, I re-enabled auto login and retested the benchmark with WPA2 over ssh.  Now, I get around 383,000 passwords per second.<br />
<br />
It seems that running a monitor while benchmarking/cracking has quite a performance impact.  Is this universally true for both Nvidia and AMD?<br />
<br />
Should setting up auto login and running oclHashcat be considered best practice given the noticeable performance benefits?<br />
<br />
Will the wiki be updated at some point so that auto login instructions will be provided for the newer versions of Ubuntu and other Linux distributions?]]></description>
			<content:encoded><![CDATA[Is there any particular reason that the Auto Login section was removed from the Linux Server how to?<br />
<br />
<a href="https://hashcat.net/wiki/doku.php?id=linux_server_howto" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/wiki/doku.php?id=linux_server_howto</a><br />
<br />
I am still running Ubuntu 14.04 and recently upgraded the driver from 14.09 to 15.12<br />
<br />
I had my /etc/lightdm/lightdm.conf file set up like this (per the former instructions).<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>greeter-session=unity-greeter<br />
user-session=openbox<br />
autologin-user=YOUR_USERNAME<br />
autologin-user-timeout=0</code></div></div><br />
As an experiment, I took the above lines out of /etc/lightdm/lightdm.conf to make my display available again on my monitor.  Taking these lines out resulted in a noticeable performance drop in passwords per second when testing with WPA2 (probably due to having to drive a monitor).<br />
<br />
I am running a 295X2 on Ubuntu 14.04 and was getting around 330,000 passwords per second with the 14.9 Catalyst Driver when connected to my machine over ssh.  I decided to upgrade the driver to 15.12 and had auto login disabled when I ran my next performance benchmark.  It was topping out at around 275,000 keys/passwords per second, a noticeable drop.<br />
<br />
Next, I re-enabled auto login and retested the benchmark with WPA2 over ssh.  Now, I get around 383,000 passwords per second.<br />
<br />
It seems that running a monitor while benchmarking/cracking has quite a performance impact.  Is this universally true for both Nvidia and AMD?<br />
<br />
Should setting up auto login and running oclHashcat be considered best practice given the noticeable performance benefits?<br />
<br />
Will the wiki be updated at some point so that auto login instructions will be provided for the newer versions of Ubuntu and other Linux distributions?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cracking Help]]></title>
			<link>https://hashcat.net/forum/thread-5546.html</link>
			<pubDate>Fri, 24 Jun 2016 23:49:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8072">MetalGuy27</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5546.html</guid>
			<description><![CDATA[Need some help with some training examples that I'm doing.<br />
<br />
I have a list of hashes and was given the beginning of each password (ex. My-Password-) and told that each one ends with 4 digits.  They can be cracked by using the mask My-Password-?d?d?d?d. I understand the ?d represents an unknown digit and I'm assuming I need to create a password list containing the password with all possible digit combinations and run it against the hashes but not sure where to go from there.  Is there an easy way to create the password list or is there a command that will take My-Password-?d?d?d?d and automatically run it against the list of hashes?<br />
<br />
Thanks in advance!]]></description>
			<content:encoded><![CDATA[Need some help with some training examples that I'm doing.<br />
<br />
I have a list of hashes and was given the beginning of each password (ex. My-Password-) and told that each one ends with 4 digits.  They can be cracked by using the mask My-Password-?d?d?d?d. I understand the ?d represents an unknown digit and I'm assuming I need to create a password list containing the password with all possible digit combinations and run it against the hashes but not sure where to go from there.  Is there an easy way to create the password list or is there a command that will take My-Password-?d?d?d?d and automatically run it against the list of hashes?<br />
<br />
Thanks in advance!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[MD5 know the password but not salt]]></title>
			<link>https://hashcat.net/forum/thread-5543.html</link>
			<pubDate>Fri, 24 Jun 2016 16:41:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8069">cogitoergosum</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5543.html</guid>
			<description><![CDATA[Hey there,<br />
<br />
I've been given a problem I'm trying to figure out. I've been given two hash's that have the same password but both are different as each has a unique 'salt'. Said hash is an MD5 string. I was wondering the best way to configure the input to account that the salt would be prepended or appended to the actual password to potentially speed up the hash checks. Right now I start it at an increment of 6 for char length as I know the password is five characters (all lowercase alphabetical). The rest of it is what is unknown.<br />
<br />
Any thoughts on how to optimize the hashcat mask attack for this?]]></description>
			<content:encoded><![CDATA[Hey there,<br />
<br />
I've been given a problem I'm trying to figure out. I've been given two hash's that have the same password but both are different as each has a unique 'salt'. Said hash is an MD5 string. I was wondering the best way to configure the input to account that the salt would be prepended or appended to the actual password to potentially speed up the hash checks. Right now I start it at an increment of 6 for char length as I know the password is five characters (all lowercase alphabetical). The rest of it is what is unknown.<br />
<br />
Any thoughts on how to optimize the hashcat mask attack for this?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Clustering Still Possible ??]]></title>
			<link>https://hashcat.net/forum/thread-5542.html</link>
			<pubDate>Fri, 24 Jun 2016 15:54:34 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8068">H4Xl0R</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5542.html</guid>
			<description><![CDATA[Hey Hashcat users and Supporters, thanks for the great work,<br />
I am using oclHashcat on a daily basis for cracking Domain Passwords on our network.<br />
As well as checking the security.<br />
<br />
Now i have some Questions left, and yes i googled a lot :-) <br />
<br />
Is it Still Possible to use Clustering for Hashact or oclHashcat ??? , the background:<br />
<br />
In our Environment there are hundreds (minimum running at same time 265) of Workstations linked together over an real fast cisco network Infrastructure, they have not the best Graphic cards on board but each of them has min i7 Cpu.(intel) (yes i know GPU is much better, but thats not the point)<br />
<br />
They are all running windows, but if needed i could change that. <br />
I´m the Domain Admin.<br />
So my question is , would it be possible to install on each of them some software for clustering them all together (CPU and maybe GPU) to crack DCC2 and other Hashes??<br />
<br />
Sure i know clustering but not in combination with hashcat or jon or ocl.<br />
<br />
I already read some things about hashstack and Hashtopus as well crackloard but i can´t get the information wich would be the best option and how to setup.<br />
<br />
I think hashstack would be the best ?? <br />
<br />
It would be much faster in my opinion to use all network computers to compute the passwords than using my Server.<br />
So i would set him up as Broker and the rest as nodes. <br />
<br />
But how ? , which clustering is supported ??<br />
<br />
I would be really happy if u could help me to get more power to these Projekt. <br />
Also i would pay some money to solve the problem for sure.<br />
<br />
maybe u can help me, would be a real great thing.<br />
Running all these computers for one instance must be powerful, its a bit also a dream so please help me :-)]]></description>
			<content:encoded><![CDATA[Hey Hashcat users and Supporters, thanks for the great work,<br />
I am using oclHashcat on a daily basis for cracking Domain Passwords on our network.<br />
As well as checking the security.<br />
<br />
Now i have some Questions left, and yes i googled a lot :-) <br />
<br />
Is it Still Possible to use Clustering for Hashact or oclHashcat ??? , the background:<br />
<br />
In our Environment there are hundreds (minimum running at same time 265) of Workstations linked together over an real fast cisco network Infrastructure, they have not the best Graphic cards on board but each of them has min i7 Cpu.(intel) (yes i know GPU is much better, but thats not the point)<br />
<br />
They are all running windows, but if needed i could change that. <br />
I´m the Domain Admin.<br />
So my question is , would it be possible to install on each of them some software for clustering them all together (CPU and maybe GPU) to crack DCC2 and other Hashes??<br />
<br />
Sure i know clustering but not in combination with hashcat or jon or ocl.<br />
<br />
I already read some things about hashstack and Hashtopus as well crackloard but i can´t get the information wich would be the best option and how to setup.<br />
<br />
I think hashstack would be the best ?? <br />
<br />
It would be much faster in my opinion to use all network computers to compute the passwords than using my Server.<br />
So i would set him up as Broker and the rest as nodes. <br />
<br />
But how ? , which clustering is supported ??<br />
<br />
I would be really happy if u could help me to get more power to these Projekt. <br />
Also i would pay some money to solve the problem for sure.<br />
<br />
maybe u can help me, would be a real great thing.<br />
Running all these computers for one instance must be powerful, its a bit also a dream so please help me :-)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Help with cracking]]></title>
			<link>https://hashcat.net/forum/thread-5541.html</link>
			<pubDate>Fri, 24 Jun 2016 00:31:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8066">7461342</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5541.html</guid>
			<description><![CDATA[I’m taking a class where we generated passwords and salts with python using the following code:<br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#!/usr/bin/python<br />
<br />
from hashlib import *<br />
import binascii<br />
<br />
salt = '3d10c0082e0a2f7d'<br />
pw = 'cat'<br />
<br />
salt = binascii.unhexlify(salt)<br />
<br />
m = md5(salt)<br />
m.update(pw)<br />
<br />
s = sha1(salt)<br />
s.update(m.digest())<br />
s.update(pw)<br />
<br />
print s.hexdigest()<br />
print pw<br />
print "----&#92;n"</code></div></div><br />
<br />
In my file, I have<br />
<br />
user:&lt;salt&gt;:&lt;hash&gt;<br />
<br />
I’ve attempted to crack these but I’m running into problems with them.  What I tried to do is take a dictionary list, run the list into the pw variable and compare the outputted hash with the hash in the password file.  This worked for like 2 passwords and then that’s all.  <br />
<br />
I was wondering if HashCat would be able to crack something like these…<br />
<br />
Thanks!]]></description>
			<content:encoded><![CDATA[I’m taking a class where we generated passwords and salts with python using the following code:<br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#!/usr/bin/python<br />
<br />
from hashlib import *<br />
import binascii<br />
<br />
salt = '3d10c0082e0a2f7d'<br />
pw = 'cat'<br />
<br />
salt = binascii.unhexlify(salt)<br />
<br />
m = md5(salt)<br />
m.update(pw)<br />
<br />
s = sha1(salt)<br />
s.update(m.digest())<br />
s.update(pw)<br />
<br />
print s.hexdigest()<br />
print pw<br />
print "----&#92;n"</code></div></div><br />
<br />
In my file, I have<br />
<br />
user:&lt;salt&gt;:&lt;hash&gt;<br />
<br />
I’ve attempted to crack these but I’m running into problems with them.  What I tried to do is take a dictionary list, run the list into the pw variable and compare the outputted hash with the hash in the password file.  This worked for like 2 passwords and then that’s all.  <br />
<br />
I was wondering if HashCat would be able to crack something like these…<br />
<br />
Thanks!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[SHA1 - Unable to use MD5 as a password]]></title>
			<link>https://hashcat.net/forum/thread-5539.html</link>
			<pubDate>Thu, 23 Jun 2016 08:28:53 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=3740">zeroprobe</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5539.html</guid>
			<description><![CDATA[Is it correct functionality of hashcat that a password of 32 characters (MD5) cannot be used for SHA1 in hashcat?<br />
<br />
I was trying to use md5's as potential passwords but found this limitation. Passwords of 31 characters are OK.<br />
<br />
Is there any way around this?]]></description>
			<content:encoded><![CDATA[Is it correct functionality of hashcat that a password of 32 characters (MD5) cannot be used for SHA1 in hashcat?<br />
<br />
I was trying to use md5's as potential passwords but found this limitation. Passwords of 31 characters are OK.<br />
<br />
Is there any way around this?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Help Please]]></title>
			<link>https://hashcat.net/forum/thread-5537.html</link>
			<pubDate>Wed, 22 Jun 2016 13:38:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8059">mearlski</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5537.html</guid>
			<description><![CDATA[HI. Im very very new to this so please forgive the very basic request. Ive been "learning" this for around 2 days with no real background in hacking/cracking etc.<br />
<br />
Ive made a word document and password protected it - the password is "mike" (nice and simple)<br />
<br />
Now I want to learn hop to get hashcat to find the password. I have got the latest version installed and have put the DOC file through QuickHash to generate a hash of the file<br />
<br />
I then used youtube (sorry but I needed to start somewhere) to come up with the following - it uses wordlists which appear to be doing the job but my GPU is not being utitlised enough (reported from HASHCAT)<br />
<br />
This is the command Im using<br />
<br />
cudahashcat64.exe -m 100 -a 3 -o --output-file=cracked.txt --remove hash.txt wordlists/HASHKILLER.TXT<br />
<br />
I dont know if its correct or not but Id love to get it running a bruteforce without worldists and using the charactersets<br />
<br />
Sorry if this is totally basic but Im struggling a little<br />
<br />
Windows PC - 960GTX GPU]]></description>
			<content:encoded><![CDATA[HI. Im very very new to this so please forgive the very basic request. Ive been "learning" this for around 2 days with no real background in hacking/cracking etc.<br />
<br />
Ive made a word document and password protected it - the password is "mike" (nice and simple)<br />
<br />
Now I want to learn hop to get hashcat to find the password. I have got the latest version installed and have put the DOC file through QuickHash to generate a hash of the file<br />
<br />
I then used youtube (sorry but I needed to start somewhere) to come up with the following - it uses wordlists which appear to be doing the job but my GPU is not being utitlised enough (reported from HASHCAT)<br />
<br />
This is the command Im using<br />
<br />
cudahashcat64.exe -m 100 -a 3 -o --output-file=cracked.txt --remove hash.txt wordlists/HASHKILLER.TXT<br />
<br />
I dont know if its correct or not but Id love to get it running a bruteforce without worldists and using the charactersets<br />
<br />
Sorry if this is totally basic but Im struggling a little<br />
<br />
Windows PC - 960GTX GPU]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Installing an additional GPU]]></title>
			<link>https://hashcat.net/forum/thread-5536.html</link>
			<pubDate>Wed, 22 Jun 2016 13:31:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2407">Si2006</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5536.html</guid>
			<description><![CDATA[Hey I'm having a problem with regards to adding an additional GPU to my system.<br />
<br />
<br />
It is usually a matter of..<br />
<br />
<br />
aticonfig --initial -f --adapter=all<br />
<br />
reboot<br />
<br />
Win!<br />
<br />
<br />
Although after I reboot the xorg.conf gets overwritten and I cannot set clocks, fan etc with aticonfig/od6config.<br />
<br />
hashcat recognises the GPU, uh OK.. but I would rather have manual control over the fans and setting the core clocks is impossible.<br />
<br />
<br />
I've switch GPU's around, tried different slots to no avail and even disabled gpu-manager.<br />
<br />
All done on a fresh install of ubuntu 14.04 + latest stable crimson drivers. 15.30<br />
<br />
I have a linked the output of a few commands below and I’d appreciate any assistance..<br />
<br />
<a href="http://pastebin.com/JHVGXnrU" target="_blank" rel="noopener" class="mycode_url">http://pastebin.com/JHVGXnrU</a>]]></description>
			<content:encoded><![CDATA[Hey I'm having a problem with regards to adding an additional GPU to my system.<br />
<br />
<br />
It is usually a matter of..<br />
<br />
<br />
aticonfig --initial -f --adapter=all<br />
<br />
reboot<br />
<br />
Win!<br />
<br />
<br />
Although after I reboot the xorg.conf gets overwritten and I cannot set clocks, fan etc with aticonfig/od6config.<br />
<br />
hashcat recognises the GPU, uh OK.. but I would rather have manual control over the fans and setting the core clocks is impossible.<br />
<br />
<br />
I've switch GPU's around, tried different slots to no avail and even disabled gpu-manager.<br />
<br />
All done on a fresh install of ubuntu 14.04 + latest stable crimson drivers. 15.30<br />
<br />
I have a linked the output of a few commands below and I’d appreciate any assistance..<br />
<br />
<a href="http://pastebin.com/JHVGXnrU" target="_blank" rel="noopener" class="mycode_url">http://pastebin.com/JHVGXnrU</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Troubleshooting overheating issues with my cracking rig]]></title>
			<link>https://hashcat.net/forum/thread-5524.html</link>
			<pubDate>Sat, 18 Jun 2016 16:12:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8050">JusticeRage</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5524.html</guid>
			<description><![CDATA[Hello everyone,<br />
<br />
I've recently invested in a dedicated password cracking machine, but I'm having trouble getting the most out of it because of heating issues. Here's a picture of how it looks inside.<br />
Basically, that's 32 GBs of RAM, a Core i7 and 4 AMD GPUs (SAPPHIRE R9 290 4G GDD5 TRI-X).<br />
<br />
<br />
<img src="http://i63.tinypic.com/2py2fqh.jpg" loading="lazy"  alt="[Image: 2py2fqh.jpg]" class="mycode_img" /><br />
<br />
Now as soon as I tried cracking some passwords with it, the overheating problems showed up. No matter what I tried, it would never run for more than 5 minutes. I figured that the GPUs were too close to each other and were blowing out their heat on each other.<br />
What I did next (while being quite unhappy about it) was remove two of the four GPUs; this way, there's some space between them for the air to circulate. I still had major overheating issues, so my last ditch effort was to place the machine in front of an opened window and add a big general purpose fan in front of it:<br />
<br />
<img src="http://i63.tinypic.com/245x4bl.jpg" loading="lazy"  alt="[Image: 245x4bl.jpg]" class="mycode_img" /><br />
<br />
Now, it works a bit better. I still get interruptions due to overheating every 1-6 hours, but at least I can get some work done. <br />
It feels quite bad to have 2 GPUs that I cannot use, though, so I was wondering if anyone would be so kind as to give me some advice on this problem. Thanks a lot in advance for your time!]]></description>
			<content:encoded><![CDATA[Hello everyone,<br />
<br />
I've recently invested in a dedicated password cracking machine, but I'm having trouble getting the most out of it because of heating issues. Here's a picture of how it looks inside.<br />
Basically, that's 32 GBs of RAM, a Core i7 and 4 AMD GPUs (SAPPHIRE R9 290 4G GDD5 TRI-X).<br />
<br />
<br />
<img src="http://i63.tinypic.com/2py2fqh.jpg" loading="lazy"  alt="[Image: 2py2fqh.jpg]" class="mycode_img" /><br />
<br />
Now as soon as I tried cracking some passwords with it, the overheating problems showed up. No matter what I tried, it would never run for more than 5 minutes. I figured that the GPUs were too close to each other and were blowing out their heat on each other.<br />
What I did next (while being quite unhappy about it) was remove two of the four GPUs; this way, there's some space between them for the air to circulate. I still had major overheating issues, so my last ditch effort was to place the machine in front of an opened window and add a big general purpose fan in front of it:<br />
<br />
<img src="http://i63.tinypic.com/245x4bl.jpg" loading="lazy"  alt="[Image: 245x4bl.jpg]" class="mycode_img" /><br />
<br />
Now, it works a bit better. I still get interruptions due to overheating every 1-6 hours, but at least I can get some work done. <br />
It feels quite bad to have 2 GPUs that I cannot use, though, so I was wondering if anyone would be so kind as to give me some advice on this problem. Thanks a lot in advance for your time!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to optimize attacking very large hashes]]></title>
			<link>https://hashcat.net/forum/thread-5517.html</link>
			<pubDate>Tue, 14 Jun 2016 06:08:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=4738">azren</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5517.html</guid>
			<description><![CDATA[Hi,<br />
<br />
I'm trying to attack a very large hashes, few GB in size and manage to get it down now to a few hundreds MB. The problem is that it takes a long time to:<br />
<ul class="mycode_list"><li>remove recovered hashes from the hash file (i'm using --remove)<br />
<br />
<br />
</li>
</ul>
Example:<br />
doing -a 3 ?a?a?a?a?a?a attack completed fast on my 2 x GTX 1080, but to get back to command prompt will take a while<br />
<ul class="mycode_list"><li>when loading, it takes a long time to compare hashes with pot file<br />
</li>
</ul>
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Comparing hashes with potfile entries...</code></div></div><br />
How can I optimize this and make it a lot faster.<br />
<br />
Thank you.<br />
<br />
Best regards,<br />
Azren]]></description>
			<content:encoded><![CDATA[Hi,<br />
<br />
I'm trying to attack a very large hashes, few GB in size and manage to get it down now to a few hundreds MB. The problem is that it takes a long time to:<br />
<ul class="mycode_list"><li>remove recovered hashes from the hash file (i'm using --remove)<br />
<br />
<br />
</li>
</ul>
Example:<br />
doing -a 3 ?a?a?a?a?a?a attack completed fast on my 2 x GTX 1080, but to get back to command prompt will take a while<br />
<ul class="mycode_list"><li>when loading, it takes a long time to compare hashes with pot file<br />
</li>
</ul>
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Comparing hashes with potfile entries...</code></div></div><br />
How can I optimize this and make it a lot faster.<br />
<br />
Thank you.<br />
<br />
Best regards,<br />
Azren]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[how i can find used algorithm]]></title>
			<link>https://hashcat.net/forum/thread-5512.html</link>
			<pubDate>Sat, 11 Jun 2016 12:50:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8026">pln</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5512.html</guid>
			<description><![CDATA[Hi, <br />
I have a problem and did not know how to resolve it.<br />
I have the encryption tool, so i can generate a file containing for example "secret".<br />
I do not know the encryption algorithm.<br />
<br />
How knowing the word "secret" and being sure of its existence in the file, find the algorithm (one of the standard one)<br />
<br />
Maciek]]></description>
			<content:encoded><![CDATA[Hi, <br />
I have a problem and did not know how to resolve it.<br />
I have the encryption tool, so i can generate a file containing for example "secret".<br />
I do not know the encryption algorithm.<br />
<br />
How knowing the word "secret" and being sure of its existence in the file, find the algorithm (one of the standard one)<br />
<br />
Maciek]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[any tools to generate masks?]]></title>
			<link>https://hashcat.net/forum/thread-5511.html</link>
			<pubDate>Fri, 10 Jun 2016 17:12:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8010">kiara</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5511.html</guid>
			<description><![CDATA[hi every1,<br />
i was wondering if any 1 knows if their is a tool that allow u to generate mask files? (or know how to make)<br />
<br />
lets say i want to make a mask with 8 characters 2 ?l 4 ?d 2 ?u<br />
<br />
<br />
?l?l?d?d?d?d?u?u<br />
?u?l?l?d?d?d?d?u<br />
?u?u?l?l?d?d?d?d<br />
?d?u?u?l?l?d?d?d<br />
etc..<br />
u get the point..<br />
writing  every singel combination manual take alot of time!]]></description>
			<content:encoded><![CDATA[hi every1,<br />
i was wondering if any 1 knows if their is a tool that allow u to generate mask files? (or know how to make)<br />
<br />
lets say i want to make a mask with 8 characters 2 ?l 4 ?d 2 ?u<br />
<br />
<br />
?l?l?d?d?d?d?u?u<br />
?u?l?l?d?d?d?d?u<br />
?u?u?l?l?d?d?d?d<br />
?d?u?u?l?l?d?d?d<br />
etc..<br />
u get the point..<br />
writing  every singel combination manual take alot of time!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[netgear router]]></title>
			<link>https://hashcat.net/forum/thread-5496.html</link>
			<pubDate>Sun, 05 Jun 2016 10:25:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=8001">dunryc</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5496.html</guid>
			<description><![CDATA[I'm trying to automate a script to automate creating cfg file for net gear routers but am unsure what algo is used to create the password hash <br />
<br />
so i used the password password as a test and get the following hash <br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>password <br />
<br />
LKtlQrlOphbQArYXL0tj6fxTNSHxLtcFEsJGTxxx746A7S/ABxx51XFF6xAm9N0F5xxx43kqhM7UF8cqSLxxxNNyDy1QL5kxYxZkFF58LXlBi2xx6Pk5VfUxxNhLKR6G</code></div></div><br />
<br />
can any one point me in the right direction so i can generate these. <br />
<br />
Apologies if i have posted in the wrong forum or an incorrect section if so can a mod please remove and any help would be grateful <br />
<br />
Dunryc]]></description>
			<content:encoded><![CDATA[I'm trying to automate a script to automate creating cfg file for net gear routers but am unsure what algo is used to create the password hash <br />
<br />
so i used the password password as a test and get the following hash <br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>password <br />
<br />
LKtlQrlOphbQArYXL0tj6fxTNSHxLtcFEsJGTxxx746A7S/ABxx51XFF6xAm9N0F5xxx43kqhM7UF8cqSLxxxNNyDy1QL5kxYxZkFF58LXlBi2xx6Pk5VfUxxNhLKR6G</code></div></div><br />
<br />
can any one point me in the right direction so i can generate these. <br />
<br />
Apologies if i have posted in the wrong forum or an incorrect section if so can a mod please remove and any help would be grateful <br />
<br />
Dunryc]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Generating random strings]]></title>
			<link>https://hashcat.net/forum/thread-5481.html</link>
			<pubDate>Sun, 29 May 2016 11:40:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=7980">MatthewK31</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-5481.html</guid>
			<description><![CDATA[I was wondering if it is following possible in oclHashcat to let it generate random 64 characters long strings (which consists of 0-9 and a-z), hash it with SHA-256 and compare the given hash to the hash I want to crack.]]></description>
			<content:encoded><![CDATA[I was wondering if it is following possible in oclHashcat to let it generate random 64 characters long strings (which consists of 0-9 and a-z), hash it with SHA-256 and compare the given hash to the hash I want to crack.]]></content:encoded>
		</item>
	</channel>
</rss>