NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Welcome to hashcat v5.0.0!


20 Results - Page 1 of 1 -
1
Author Message
Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Sun, 28 Oct 2018 @ 17:55:35

This release is mostly about two new major features:

- The hashcat brain
- Slow candidates

Before we go into the long read of these new featues, here's all the other changes that come along with this release:

Algorithms:
Added hash-mode 17300 = SHA3-224
Added hash-mode 17400 = SHA3-256
Added hash-mode 17500 = SHA3-384
Added hash-mode 17600 = SHA3-512
Added hash-mode 17700 = Keccak-224
Added hash-mode 17800 = Keccak-256
Added hash-mode 17900 = Keccak-384
Added hash-mode 18000 = Keccak-512
Added hash-mode 18100 = TOTP (HMAC-SHA1)
Removed hash-mode 5000 = SHA-3 (Keccak)

Source: https://hashcat.net/forum/thread-7903-post-42585.html#pid42585
Download binaries or sources: https://hashcat.net/hashcat/


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
InfiniteAttack

Status: n/a
Joined: Tue, 10 Jul 2018
Posts: 370
Team: [TeamName]
Reputation: 490 Reputation
Offline
Sun, 28 Oct 2018 @ 18:00:25

Slow hash speed boosts? Nice!


Please +rep if I helped you. :)

BTC: 3NdvitNs3HhAkAUwRtqreGChJf38Q6V3VK
ETH: 0xca0883Fd3FE3f8Bd5a96528Ca9C2Fe607901CEA0

Avatar
ukris

Status: n/a
Joined: Sat, 29 Sep 2018
Posts: 21
Team:
Reputation: 0 Reputation
Offline
Sun, 28 Oct 2018 @ 18:00:37

Are any of these WPA3?


Avatar
dipeperon

Status: n/a
Joined: Tue, 03 Apr 2018
Posts: 188
Team:
Reputation: 281 Reputation
Online
Sun, 28 Oct 2018 @ 20:32:35

Seems to ignore the masks I feed it and run it's own 1-15 masks. Hmmm

Someone with real hashing power let those masks run on the remaining lists pls

Brain feature sounds amazing


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Sun, 28 Oct 2018 @ 22:27:27

"Brain function" working well.

On the sever side - start hashcat brain server on port 13743:

root@Helium-XR-01:~# hashcat --brain-server --brain-port=13743
1540763657.002542 | 0.00s | 0 | Generated authentication password: 78f581b2296937fb
1540763657.002943 | 0.00s | 0 | Brain server started
1540764152.164355 | 495.16s | 4 | Connection from xxx.yyy.xxx.yyy:53614
1540764152.487870 | 0.32s | 4 | Session: 0x7451768d, Attack: 0x99708c5b, Kernel-power: 64
1540764152.673725 | 0.19s | 4 | R | 0.06 ms | Offset: 0, Length: 64, Overlap: 0
1540764153.009471 | 0.34s | 4 | L | 0.04 ms | Long: 0, Inc: 64, New: 64
1540764656.023797 | 503.01s | 4 | Disconnected

On the client side - start hashcat brain client attack:

hashcat --brain-client --brain-host=IP --brain-port=13743 --brain-password=78f581b2296937fb -m 3200 -a 0 /root/left_3200.txt /usr/share/wordlists/bcrypt_dic.txt 
Session..........: hashcat (Brain Session/Attack:0x7451768d/0x99708c5b)
Status...........: Quit
Hash.Type........: bcrypt $2*$, Blowfish (Unix)
Hash.Target......: /root/left_3200.txt
Time.Started.....: Sun Oct 28 23:02:31 2018 (8 mins, 24 secs)
Time.Estimated...: Sun Jun 7 00:16:20 2037 (22 days)
Guess.Base.......: File (/usr/share/wordlists/bcryt_dic.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: xxx kH/s (4.94ms) @ Accel:4 Loops:1 Thr:8 Vec:4
Recovered........: 0/506 (0.00%) Digests, 0/506 (0.00%) Salts
Progress.........: 6208/7258259316 (0.00%)
Rejected.........: 0/6208 (0.00%)
Brain.Link.#1....: N/A
Restore.Point....: 0/14344386 (0.00%)
Restore.Sub.#1...: Salt:97 Amplifier:0-1 Iteration:127-128
Candidates.#1....: 123456 -> charlie


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Tue, 30 Oct 2018 @ 08:27:37

Slow Candidates
Important: Slow Candidates attack "-S" for slow hashes or large hashlists with fast hashes, but many salts.


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
dipeperon

Status: n/a
Joined: Tue, 03 Apr 2018
Posts: 188
Team:
Reputation: 281 Reputation
Online
Tue, 30 Oct 2018 @ 09:35:20

Has anyone figured out how to use a masks file as attack on this version?


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Tue, 30 Oct 2018 @ 20:36:02

dipeperon said:

Has anyone figured out how to use a masks file as attack on this version?

Hybrid attack (mode 6, 7) not implemented.
(Invalid attack mode (-a) value specified in slow-candidates mode.)

Mask attack working:

"hashcat -O -S -m 3200 -a 3 left_3200_hashes.txt /usr/share/hashcat/masks/rockyou-1-60.hcmask"


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Wed, 31 Oct 2018 @ 08:51:03

Hashcat brain function - tested on a slow PC.

Brain-server OS: Ubuntu 18.04 LTS x86_64
Brain-client OS: Kali Linux x86_32, VERSION_ID="2018.4"

Hashcat "brain function" tested and works well. It is a great improvement for cracking hashes alone or in a team... 

In my case the brain server was a VPS.

Network throughput measurement:

root@kali:~# iperf -c brain-server-IP
------------------------------------------------------------
Client connecting to brain-server-IP, TCP port 5001
TCP window size: 43.8 KByte (default)
------------------------------------------------------------
[  3] local cliens IP port 51730 connected with brain-server-IP port 5001
[ ID] Interval       Transfer     Bandwidth
[  3]  0.0-10.1 sec  87.8 MBytes  72.7 Mbits/sec

Case 1: Reject duplicate candidates
root@kali:~# hashcat-brain -m 3200 -a 0 bcrypt_3200.txt /usr/share/wordlists/TOP_1million/top_1_100E_numbers.txt -r /usr/share/hashcat/rules/nsa64.rule 
hashcat (v5.0.0) starting...

Session..........: hashcat (Brain Session/Attack:0x7451768d/0x113d8b61)
Status...........: Running
Hash.Type........: bcrypt $2*$, Blowfish (Unix)
Hash.Target......: bcrypt_3200.txt
Time.Started.....: Wed Oct 31 09:09:18 2018 (8 secs)
Time.Estimated...: Thu Jul 16 16:05:41 2026 (1 years, 258 days)
Guess.Base.......: File (/usr/share/wordlists/TOP_1million/top_1_100E_numbers.txt)
Guess.Mod........: Rules (/usr/share/hashcat/rules/nsa64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:       133 H/s (8.65ms) @ Accel:4 Loops:2 Thr:8 Vec:4
Recovered........: 0/497 (0.00%) Digests, 0/497 (0.00%) Salts
Progress.........: 3040/3180800000 (0.00%)
Rejected.........: 2982/3040 (98.09%)
Brain.Link.#1....: RX: 76 B (0.00 Mbps), TX: 550 B (0.00 Mbps), idle
Restore.Point....: 0/6400000 (0.00%)
Restore.Sub.#1...: Salt:1 Amplifier:0-1 Iteration:542-544
Candidates.#1....: ~~~~ - ~~~~92

Rejected 2982 duplicates.
TESTED. WORKING FINE.

Create candidates:
root@kali:~# hashcat --stdout /usr/share/wordlists/TOP_1million/top_1_100E_numbers.txt -r /usr/share/hashcat/rules/nsa64.rule -o candidates.txt

Number of total candidates  used "top_1_100E_numbers.txt" dictionary with "nsa64.rule":
root@kali:~# wc -l candidates.txt 
6400000 candidates.txt

Number of unique candidates:
root@kali:~# sort -u candidates.txt | wc -l
5710955

Case 2: Stop caring about what you've done in the past
You have a single hash, but it is very high profile. You can use all of your resources. You start cracking - nothing. You try a different attack - still nothing. You're frustrated, but you must continue.. So try more attacks ... but even after two or more days - nothing. You start wondering what you've already done, but you're starting to lose track, getting tired, and making mistakes. Guess what? 
The hashcat brain comes to the rescue!
Now let's say that two days later, you forgot that you already performed the attack before.  Or maybe it wasn't you who forgot, it's just your coworker on a different machine also trying. 

The hashcat brain correctly rejected *all* of the candidates.
TESTED. WORKING FINE.

Case 3-4: Improve on what you've done in the past
TESTED. WORKING FINE.


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
Szul

Status: Elite
Joined: Sat, 15 Sep 2012
Posts: 1400
Team:
Reputation: 1222 Reputation
Offline
Wed, 31 Oct 2018 @ 10:03:26

C:\Moje\HashCat\hashcat-5.0.0>hashcat64.exe --brain-server
1540980142.313098 | 0.01s | 0 | Generated authentication password: 39923a5b836efb5e
1540980142.313098 | 0.00s | 0 | socket: Result too large


Jabber: Szul@jabb.im
4 x GTX 1080
TEAM HASHCAT

Avatar
Szul

Status: Elite
Joined: Sat, 15 Sep 2012
Posts: 1400
Team:
Reputation: 1222 Reputation
Offline
Wed, 31 Oct 2018 @ 10:07:06

ok, newest beta fix this isue


Jabber: Szul@jabb.im
4 x GTX 1080
TEAM HASHCAT

Avatar
SMoRBOLL

Status: n/a
Joined: Tue, 06 Nov 2018
Posts: 2
Team:
Reputation: 0 Reputation
Offline
Tue, 06 Nov 2018 @ 02:06:05

freeroute said:

[left]"Brain function" working well.

On the sever side - start hashcat brain server on port 13743:

[i]root@Helium-XR-01:~# hashcat --brain-server --brain-port=13743

On the client side - start hashcat brain client attack:

Can someone confirm that this is the correct sequence? I am struggling to get the brain-server to work. I would have thought that the server would initiate the attack and then clients would join. Maybe I need the newest beta.

Also can the brain-server be used against the hashcat benchmark?


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Tue, 06 Nov 2018 @ 06:33:20

In my case on the server side (it's a remote server) I created a system service for hashcat-brain function.
I can start, stop, reload hashcat-brain service. After reboot the service started automatically. 

Step 1:
Cretated a "hashcat_brain_server.service" file in the directory /etc/systemd/system/:

Code:
nano /etc/systemd/system/hashcat_brain_server.service 


File content:
Code:
[Unit]
Description= Start hashcat brain server
[Service]
Type=simple
ExecStart=/bin/bash -c "/usr/local/bin/hashcat --brain-server --brain-host=IP --brain-port=1374 --brain-password=password"
Restart=on-failure
[Install]
WantedBy=multi-user.target
Alias=hashcat-brain.service

Save this file.

Step 2:

We need to reload the systemd daemon:
systemctl daemon-reload

Step 3:

Check server with "netstat" or "ss" commands.
You should see this row:

Code:
root@Helium-XR-01:~# netstat -antp

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 0.0.0.0:443             0.0.0.0:*               LISTEN      666/apache2     
tcp        0      0 xxx.xxx.xxx.xxx:1374      0.0.0.0:*               LISTEN      32397/hashcat   
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN      627/mysqld      
tcp        0      0 0.0.0.0:80              0.0.0.0:*               LISTEN      666/apache2     
......    
tcp6       0      0 :::22                   :::*                    LISTEN      612/sshd 

 Check service status:

Code:
root@Helium-XR-01:~# systemctl status hashcat-brain.service

● hashcat_brain_server.service - Start hashcat brain server
Loaded: loaded (/etc/systemd/system/hashcat_brain_server.service; enabled; vendor preset: disabled)
Active: active (running) since Mon 2018-11-05 09:23:39 UTC; 21h ago
 Main PID: 32397 (hashcat)
Memory: 2.7G
CGroup: /system.slice/hashcat_brain_server.service
 └─32397 /usr/local/bin/hashcat --brain-server --brain-host=xxx.xxx.xxx.xxx --brain-port=1374 --brain-password=pasword
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.242933 | 0.00s |  -1 | Read 34688 bytes from attack 0xcbd4ae46 in 0.35 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.243136 | 0.00s |  -1 | Read 1264 bytes from attack 0x1a2fb5c0 in 0.19 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.243339 | 0.00s |  -1 | Read 16 bytes from attack 0x442d5481 in 0.19 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.243524 | 0.00s |  -1 | Read 1280 bytes from attack 0x77980c15 in 0.17 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.243808 | 0.00s |  -1 | Read 8896 bytes from attack 0x0ca746f1 in 0.27 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.244122 | 0.00s |  -1 | Read 11264 bytes from attack 0x9468c39d in 0.25 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.244306 | 0.00s |  -1 | Read 320 bytes from attack 0xd78528ce in 0.17 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.245787 | 0.00s |  -1 | Read 186320 bytes from attack 0xa7865a4f in 1.47 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.246027 | 0.00s |  -1 | Read 11632 bytes from attack 0x08434f8d in 0.23 ms
Nov 05 09:23:47 Helium-XR-01 bash[32397]: 1541409827.246507 | 0.00s |  -1 | Read 49632 bytes from attack 0x8fe3d3e4 in 0.47 ms

Check brain-server logs:

Code:
root@Helium-XR-01:~# journalctl -u hashcat_brain_server

-- Logs begin at Thu 2018-11-01 12:50:29 UTC, end at Tue 2018-11-06 06:31:27 UTC. --
Nov 01 12:50:29 Helium-XR-01 bash[27864]: 1541076628.986307 | 0.00s | 4 | R |  0.06 ms | Offset: 806060, Length: 629, Overlap: 0
Nov 01 12:50:29 Helium-XR-01 bash[27864]: 1541076628.986639 | 0.00s | 4 | L |  0.18 ms | Long: 1361261, Inc: 518, New: 284
Nov 01 12:50:29 Helium-XR-01 bash[27864]: 1541076629.158441 | 0.17s | 4 | C |  0.11 ms | Attacks: 2
Nov 01 12:50:29 Helium-XR-01 bash[27864]: 1541076629.161942 | 0.00s | 4 | C |  3.48 ms | Hashes: 679
Nov 01 12:50:29 Helium-XR-01 bash[27864]: 1541076629.162074 | 0.00s | 4 | R |  0.09 ms | Offset: 806689, Length: 1024, Overlap: 0
Nov 01 12:50:29 Helium-XR-01 bash[27864]: 1541076629.162703 | 0.00s | 4 | L |  0.25 ms | Long: 1361940, Inc: 855, New: 435
Nov 01 12:50:29 Helium-XR-01 bash[27864]: 1541076629.163276 | 0.00s | 4 | R |  0.07 ms | Offset: 807713, Length: 589, Overlap: 0
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.163630 | 0.00s | 4 | L |  0.21 ms | Long: 1361940, Inc: 586, New: 298
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.349158 | 0.19s | 4 | C |  0.10 ms | Attacks: 2
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.352393 | 0.00s | 4 | C |  3.22 ms | Hashes: 733
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.353318 | 0.00s | 4 | R |  0.07 ms | Offset: 808302, Length: 1024, Overlap: 0
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.353811 | 0.00s | 4 | L |  0.28 ms | Long: 1362673, Inc: 1018, New: 506
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.354136 | 0.00s | 4 | R |  0.06 ms | Offset: 809326, Length: 518, Overlap: 0
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.354412 | 0.00s | 4 | L |  0.15 ms | Long: 1362673, Inc: 501, New: 249
Nov 01 12:50:30 Helium-XR-01 bash[27864]: 1541076629.549692 | 0.20s | 4 | C |  0.10 ms | Attacks: 2


Step 4:

On the client side, we can start hashcat-client to connect hashcat-brain server and start cracking.

Code:
hashcat --status -O -z --brain-host=IP of the hashcat-brain-server --brain-port=1374 
--brain-password=password -m 3200 -a 0 hash.txt dictionary.txt -r rules.rule


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
SMoRBOLL

Status: n/a
Joined: Tue, 06 Nov 2018
Posts: 2
Team:
Reputation: 0 Reputation
Offline
Fri, 09 Nov 2018 @ 20:21:03

freeroute said:

[left]In my case on the server side (it's a remote server) I created a system service for hashcat-brain function.
I can start, stop, reload hashcat-brain service. After reboot the service started automatically. 

Thank you. I will give this a try. I should have some time over the next few days. I appreciate the swift and thorough reply.


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Thu, 15 Nov 2018 @ 07:08:44

Recommended system specifications for hashcat-brain server.
https://hashcat.net/forum/thread-7947-post-42777.html#pid42777


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
LDGrinn

Status: n/a
Joined: Sat, 24 Nov 2018
Posts: 3
Team:
Reputation: 0 Reputation
Offline
Sun, 25 Nov 2018 @ 08:31:06

Hello,

I've installed hashcat-5.0.0 on a windows10, together with the Hashcat GUI (HashcatGUI_1.00r3).
After 3 hashes (Excel password 2013), I ran a 4th one, which started halting and stopping eventually after 1~2hours for no reason. H/S drops to 0 when I update with [S] and starts climbing slowly up to 500 H/S (where my usual speed was 4500 H/S. Therefor I was reloading the last .restore to continue with normal speed until the next freeze/halt/stop.

In other words a 6hour break took me over 12 hours, so I've downloaded hashcat-5.0.0+102 (Beta) and tried to open the .restore with the beta, or create a new job with the GUI, but an error prevents me:

hashcat64.exe: unknown option -- gpu-temp-disable
Invalid argument specified.


It doesn't matter if the temperature setting is set or disabled, the GUI is not working with the Beta version of hashcat.

this is what runs, but I can't change it with the GUI and it won't execute if I do it manually for some reason:

-a
3
--session=2018-11-23
-m
9600
-w
2
--username
--status
--status-timer=60
--potfile-disable
--remove
-p
:
--gpu-temp-disable
-o
C:\Users\LiliD.Grinn\Desktop\Newfolder\result.txt
--outfile-format=3
-i
--increment-min=11
--increment-max=11
-1
C:\Charset1.hcchr
C:\Users\LiliD.Grinn\Desktop\Newfolder\1.txt
?u?l?l?l?12018?d?d

Is there a newer version of the GUI or a more stable/working Beta?
Why does it stop? (I did install the wddm_timeout_patch, didn't fix).


Avatar
Mexx666666
Moderator
Status: Elite
Joined: Fri, 21 Jul 2017
Posts: 668
Team:
Reputation: 2170 Reputation
Offline
Sun, 25 Nov 2018 @ 08:33:59

HashcatGUI v1.00rc4:
https://hashkiller.co.uk/dump/HashcatGUI.rar


PLZ +rep if I helped out!

BTC: 1FxAJJhcqf2DXt[remove]PkdTQi56uc3EGxYQjG4T
ETH: 0x696e8de716[remove]e0c85e0c8bb6d3c3beb4bf1b7c4ed7
PP: mexx66[remove]@gmx.net
Discord: Mexx666666#2361

Avatar
LDGrinn

Status: n/a
Joined: Sat, 24 Nov 2018
Posts: 3
Team:
Reputation: 0 Reputation
Offline
Sun, 25 Nov 2018 @ 08:45:44

Mexx666666 said:

HashcatGUI v1.00rc4:
https://hashkiller.co.uk/dump/HashcatGUI.rar


Sadly, this version also strikes me with:

hashcat64.exe: unknown option -- gpu-temp-disable
Invalid argument specified.


Changed profile, temp, disabled ~ 75C ~ 90C, always shows the same error with the beta.


I will try to run the stable hashcat 5.0 with this GUI to see if it will randomly halt/stop.


Update2: The GUI does work for now (with 5.0 stable). I had to check the box for "Ignore usernames"


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2325
Team:
Reputation: 7872 Reputation
Online
Sun, 02 Dec 2018 @ 11:32:46

hashcat v5.1.0 is out!

Source: https://hashcat.net/forum/thread-7983-post-42977.html#pid42977


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
gpuhash_me

Status: Cracker
Joined: Sun, 08 Nov 2015
Posts: 530
Team: gpuhash team
Reputation: 1185 Reputation
Offline
Sun, 02 Dec 2018 @ 17:42:04

By the way I found very annoying bug(?) in current hashcat version.
If you use wordlist combination attack and append some char between words with simple '-j $' rule (i.e. cracking e-mail hashes with logins and domains in separate files and inserting '@' char between words) hashcat will completely skip dictstat check and reread wordlists every time before cracking. It may lead to unnecessary loss of time especially in distributed environments.

Quick and dirty hack in wordlist.c:

Code:
---  if (run_rule_engine (user_options_extra->rule_len_l, user_options->rule_buf_l) == 0)
+++  if ( user_options_extra->rule_len_l == 0 || (user_options_extra->rule_len_l == 1 && user_options->rule_buf_l[0] == RULE_OP_MANGLE_NOOP) ||
+++  (user_options_extra->rule_len_l == 2 && (user_options->rule_buf_l[0] == RULE_OP_MANGLE_APPEND || user_options->rule_buf_l[0] == RULE_OP_MANGLE_PREPEND))) 

I will not send pull request because we have to find more correct way first


GPUHASH.me team official representative
Support, discounts, free offers for forum members


20 Results - Page 1 of 1 -
1

We have a total of 163292 messages in 20499 topics.
We have a total of 19267 registered users.
Our newest registered member is johnbranches.