Questions tagged [hashcat]

Hashcat is a program designed to brute force hashes, and is commonly used to crack passwords.

153 questions
3
votes
2 answers

hashcat: No hashes loaded

I've been trying Kioptrix: Level 1.1 (#2) and managed to get root access. https://www.vulnhub.com/entry/kioptrix-level-11-2,23/ wolf@linux:~$ nc -vklp 8080 listening on [any] 8080 ... 10.10.10.10: inverse host lookup failed: Unknown host connect to…
Wolf
  • 367
  • 2
  • 5
  • 17
3
votes
1 answer

hashcat - is there a way to set minimum password length?

Let's say I have a couple of hashes that I need to bruteforce as dictionary attack didn't work. Is there a way I can tell hashcat to start from a specific password length so it won't waste resources on looking for results that won't work?
2
votes
1 answer

Hashcat password cracking

Consider a laptop running Ubuntu 14.04 which has only Hashcat installed apart from the standard software. Is it correct to say that the attempts of brute force per second will be twice faster if I have a quad core processor instead of a duo…
user69377
2
votes
2 answers

hashcat: clCreateContext(): CL_INVALID_PLATFORM

I'm just trying out hashcat v3.6.0 on an up-to-date Arch Linux laptop. hashcat -I shows me this: OpenCL Info: Platform ID #1 Vendor : Intel(R) Corporation Name : Intel(R) OpenCL Version : OpenCL 1.2 LINUX Device ID #1 Type …
Bruce Ediger
  • 4,532
  • 2
  • 27
  • 26
1
vote
0 answers

Hashcat with md5 and Mask

I'm trying to connect to my meter by using some open-source software, all the meter supports the dlms-cosem standard. But the problem is the meter disconnected due to a failed security check. After some research about the issue, I found the…
Zeus8497st
  • 21
  • 2
1
vote
1 answer

Using hashcat -s with --increment

I have multiple computers which I am planning to use. They all run a custom-made client that starts hashcat with different args. I am able to submit the current progress, candidates etc (everything in console output) to the server, but I am unsure…
user277837
1
vote
1 answer

Hashcat mask attack getting error "seperator unmatched"

I'm trying to crack the password Ul1234 using hashcat. I created a user with that password in kali and copied the hash in the shadow…
Hans Martin
  • 13
  • 1
  • 1
  • 3
1
vote
1 answer

Hashcat to mask recover variable length password with known suffix

I'm struggling with creating a mask to brute-force using Hashcat a password of variable length, but with a known suffix. Say the known suffix is 123$ but the variable-length "prefix" can contain between 4 and 7 characters (i.e. total length 8 to 11…
kingblah
  • 11
  • 2
1
vote
3 answers

Does the current hashcat include CUDA?

I've been using the old cudahashcat 2.x until I reinstalled my system. I realized I cann't find any newer release on cudahascat so I assume it is included in hashcat but when I look at their github it seems to be only the OpenCL is included. So my…
Aero Wang
  • 141
  • 1
  • 1
  • 6
0
votes
0 answers

hashcat token length exception

Using pdf2john I get a hash like this: $pdf$2*3*128*2147483644*1*16*1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111*32*9999999999999999999999999999999999999999999999999999999999999999 According to…
kotozna
  • 153
  • 5
0
votes
1 answer

I know hash and salt; how do I use hashcat to decrypt?

hash: 341A451DCF7E552A237D49A63BFBBDF1 salt: 1234 I have a word bank I generated using CeWL that I think I am supposed to use. But when I run hashcat --force -a 0 -m 0 341A451DCF7E552A237D49A63BFBBDF1 custom_dict.txt I get no hits. I have tried…
John
  • 1
  • 1
  • 1
0
votes
0 answers

Hashcat:: Token length exception. No hashes loaded

I'm trying to crack a wallet.dat hash from an old file from 2013. I created a hash with bitcoin2john and it is 112 characters. I can't get it to work. I'm wondering if there is something wrong with my command or the hash itself. I've seen on other…
J. Morrison
  • 1
  • 1
  • 3
0
votes
0 answers

What is the difference between 7100, 16700 and 18300 hashcat modes?

Studying how expensive and how long it takes to brute force macOS Catalina and Big Sur passwords (if possible on T2/M1 Macs). My (likely naive) understanding is that macOS uses PBKDF2-SHA512 to hash passwords. Why 3 modes?
sunknudsen
  • 219
  • 1
  • 12
0
votes
0 answers

How to benchmark mode with given iterations in hashcat?

I installed hashcat using following: sudo apt update sudo apt -y install p7zip-full curl -O https://hashcat.net/files/hashcat-6.2.3.7z 7z x hashcat-6.2.3.7z hashcat-6.2.3/hashcat.bin -b When I run hashcat-6.2.3/hashcat.bin -b -m 7100, iterations is…
sunknudsen
  • 219
  • 1
  • 12
0
votes
1 answer

What exactly is this hash that Jack the Ripper and Hashcat use (and also have tools for extracting?)

These tools work based on "hashes", but they seem to not mean that in traditional sense, since they can also extract hashes from a variety of formats like kdbx and zip. I doubt all these formats also keep a hash of the password inside themselves…
Hormoz
  • 171
  • 4
1
2