Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7674 articles
Browse latest View live

Opinions on this rig?


Maskprocessor and CudaHashcat - 16 Numbers Bruteforce

$
0
0
Hello Everybdoy,
I'm trying to brutforce an 16 Numbers Password. The Password has only numbers and a max of 3 double nummbers.
As example, the password couldbe: 1112345556789223

I'm working with Windows 7 x64. I've entered the following:

Code:
"maskprocessor-0.73\mp64.exe" -i --increment=16:16 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d -q 3 | "cudaHashcat-1.37\cudaHashcat64.exe" -m 2500 output.hccap

But as far as I can see, it is not starting with 16 numbers length. In the Progress stands 1769472 and so on...
What am I doing wrong?
How can I start with a length of 16 numbers?

Hope you can help me with that. Thanks.

installing v.50 hashcat CPU kali sana

$
0
0
I have the hashcat-0.50.7z archive, but it doesn't seem to contain any linux applications.  I ask because supposedly the latest beta corrects a bug where hybrid rule-based attacks with hashcat were skipping some wordworddigitdigitdigit combos...

could you guys advise me how to upgrade to v.50 in kali 2.0?

Weird exception when cracking DES(unix)

$
0
0
I'm getting a weird line-length exception with this command:
Code:
cudaHashcat64 -m 1500 -a 3 --session session1 ?d?d?d?d?l?l -o file.txt --remove hashed_file.txt

It's throwing me the error with the ?d?d?d?d?l?l section, and I'm not sure why.

combinator.bin command not found?

$
0
0
logged in as root, in the /usr/share/hashcat-utils directory.....but

root@kali:/usr/share/hashcat-utils# ./combinator.bin --help
bash: ./combinator.bin: No such file or directory   huh?? combinator.bin is most certainly in there.

root@kali:/usr/share/hashcat-utils# echo $PATH
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/sbin/:/usr/sbin/:/usr/share/maskprocessor/:/usr/share/hashcat-utils/

what is up with this?? I can't be this stupid...... :-)

db60

identifing hash type

$
0
0
I want to preface this with saying I've read the forum rules and I'm trying my best to comply with them. I'm not asking anyone to crack hashes for me, and I've no intention of posting any un-masked hashes on here.

I work as a pentester and I'm completing an audit of a third-party site for my employer. In the course of the audit my team managed to pull several password hashes from an MSSQL database using SQL injection. We're now trying to crack those hashes, but they don't fit any format I've ever seen.

The hashes are all 9-23 characters in length, alpha-numeric, mixed case, and contain hyphens and underscores. Our first guess was there was some sort of base64 encoding going on, but that doesn't fit with the hyphens and underscores.

Does anyone have any insight into mssql hashing methods, and what this might be? The hashes aren't long enough to be any of the typical mssql methods, and I can't explain the variable length.

HD5970 Kernel "No such file or directory"

$
0
0
I hope it is ok to reuse this thread.. I'm using the latest version.

I haven't been here for a while, now starting up with some machines again.

1# 2x HD5970
2# 1x HD5970, 1xHD6870

(3# not tested yet. 3xR9 290X)


But, I keep getting this error on HD5970. These cards have performed well before..

ERROR: ./kernels/4098/m00900_a3/.VLIW5.llvmir: No such file or directory

I used the guide, as always... with Ubuntu Server 14.04-03

uname -a:
Linux PENNY 3.16.0-52-generic
Any ideas?

hashcat v0.50 hybrid rules

$
0
0
so I'm attempting a hybrid rule-based attack with hashcat, trying to generate candidates like 1stword2ndword123. here is my command line:

hashcat -m 2500 -a 1 -r bf.rule /home/me/hccap/some.hccap /home/me/wordlists/a.txt

bf.rule created with maskprocessor to append 3 digits: ./mp.bin -o bf.rule '$?d?d?d'

the last four words in my test wordlist are:
abuse
abused
acacia
accept

--stdout shows this works pretty well, but it's skipping the last few candidates, and I can't figure out why:

acceptabuse996
acceptabuse997
acceptabuse998
acceptabuse999
acceptabused996
acceptabused997
acceptabused998
acceptabuse999
acceptacacia996
acceptacacia997
acceptabused998
acceptabuse999
acceptaccept996
acceptacacia997
acceptabused998
acceptabuse999

it skipped
acceptabused999
acceptacacia998,999
acceptacept997,998,999

and duplicated some others, like acceptabuse999

this was done using v.50, whose changelog says the dupes have been fixed.  ??

what, if anything, am I doing wrong that would produce this behavior.....I am truly stumped, and any help MOST appreciated!

db60

8 Character Unix DES Question

$
0
0
So I have enjoyed my time learning tons in the past week about this stuff, and I really appreciate all the help from the people I have gotten during that time.

It looks like the end(heh) may be in sight for the passwords I've been cracking.  Out of 442 DES Unix passwords, I'm down to 106, and I believe they're all 8 character.

I also learned that cracking the hashed passwords that are that large takes an extraordinary amount of time with masks, and didn't even happen with my 13gb wordlist.  

So with that, what could I be missing that assists with 8 character words?

OSX 10.10 (-m 7100) Hash Question

$
0
0
Hey all, I'm working on a pentest engagement and got the hash for an OSX (v10.10.5) account using this technique.

According to the plist file, it's a SALTED-SHA512-PBKDF2 key, I have the entropy, iterations, and salt values properly created in a file on disk.

When I run oclHashcat (1.37) against it, I get a line-length exception.
When I run hashcat (0.50) against it, it recognizes the hash and works perfectly.

I get the exact same errors when I use the Mode 7100 example hash from here.
Can anyone tell me what might be causing the inconsistencies? I'd certainly prefer to use oclHashcat against it to better leverage my GPUs.

Thanks!

Hybrid Attack?

$
0
0
whats the difference between these 2 attacks? the above is the hybrid attack and the second is the combination attack


$ ... -a 6 password.txt ?d?l?d?l


$ ... -a 1 password.txt ?d?l?d?l

both seems to work, and the result also seems to be identical.. or am i wrong

Mask understanding help needed

What I'm doing wrong?

$
0
0
I'm learning this program and starting to follow article from Wiki https://www.question-defense.com/2010/08...int-attack
In first step author run a five character long brute force using a full charset (lowercase, uppercase, digits, special characters) against the list of 650,000 unique hashes. And on GeForce GTX 285 it took a few seconds. How is it possible? I've tried the same attack and Hashcat told me it will took 3 years to complete. Have I missed something?

Titan Z

I have a problem with starting the hash use

$
0
0
I have downloaded hashcat-0-45 and cudahashcat-1.37, then I extracted cudahascat-1.37 to folder that hashcat-0.45.rar file had been extracted.

everybody take a look at " Hash me, I'm a digest", these words cann't click to work. what happed to my hashcat? I do something wrong, don't I ?, help me correct it. I run hashcat on window 7.
thank you.

.jpg   hascat 1.jpg (Size: 117.14 KB / Downloads: 7)

Sting Value over 54 chars. Not working for me.

$
0
0
I have a Hash value in an input file that is 54 characters in length.
Hashcat gives the following error.
I get the same error on OclHashcat as well.

Please assist me in creating the correct syntax to run the app on string length other than 32 characters in both Hashcat and OclHashcat. 
Below is my error message.

This copy of hashcat will expire on 01.01.2016. Please upgrade to continue using hashcat.
Initializing hashcat v0.50 with 8 threads and 32mb segment-size...
Skipping line: <redacted>(line length exception)
No hashes loaded 

Thanks
Hank Freeman

Cracking eight different TrueCrypt ciphers for the price of three

$
0
0
Yeah, that subject really sounds like some bad advertisement, but it actually describes my discovery pretty good, I promise! I don't know if this really is new, however for me it is and it will definitely make it's way into the next oclHashcat version.

The current release version of oclHashcat (v1.37) is already able to crack TrueCrypt volumes, though it only is able to crack AES encrypted volumes. However, I'm in the middle of implementing the other ciphers too, including the cascaded ciphers.

TrueCrypt lets you choose between three different hashing algorithms and three different ciphers, additionally you can combine the ciphers (and cascade them) to a total of eight different ciphers. Cascading just means that your data is first encrypted with, for example, AES and the output of which is again used as input for another round of encryption, for example with Twofish. Here's a full list:

Hashes:
  • RipeMD160
  • SHA512
  • Whirlpool
Ciphers:
  • AES
  • Serpent
  • Twofish
Additional cascaded ciphers:
  • AES-Twofish
  • AES-Twofish-Serpent
  • Serpent-AES
  • Serpent-Twofish-AES
  • Twofish-Serpent
The first problem you encounter when attacking TrueCrypt is the lack of headers in the TrueCrypt volume. The header would contain metadata, which would tell you about the hashing algorithm and the cipher being used and also if it is actually a TrueCrypt volume. For comparison LUKS does include a header with identifiable informations. My guess is that some just believe this to be more secure. An attacker can not know that this file is a TrueCrypt encrypted volume by only seeing the pure data without context, it just looks like random garbage. But in most cases the attacker knows that some files are really TrueCrypt encrypted volumes due to the enabled "history" feature (which for convenience remembers the filename used) or simply because of an obvious filename.

The next problem for the attacker is that he does not know which hashing algorithm and which cipher was used to create the volume. Funny side note, TrueCrypt does not know either. As a matter of fact both have to simply try all possible combinations by decrypting the first block of data. This first block (after decryption) contains a known and fixed marker and some other checksums. If an attacker (or the TrueCrypt software itself) can confirm that marker after decrypting the first block, given the correct key, the current hashing algorithm and cipher will be selected.

Though, because only the user knows the password, this only works for the real user. The attacker has both problems at once, he does not know the password and he does not know the hashing algorithm or the cipher. We can come to the conclusion that an attacker has to try the same password against a total of 24 different combinations. This means oclHashcat will support 24 different modes (actually more because of hidden-volume and boot support) to crack TrueCrypt volumes.

The way TrueCrypt works is that it will know by the selection of the cipher or cascaded cipher which output keysize to compute using the KDF function. For example "AES-Twofish-Serpent", the creation involved three different ciphers, each of size 512 bit. It takes the password from the user and sets the output keysize for the KDF function to 1536, the reason being: 3 * 512 = 1536. And here comes the problem: Because of how PBKDF2 is designed, the first 512 bits are always the same regardless of the selected output keysize. This is also true for the next 512 bits and the last 512 bits. In other words, the leading bits of the output key do not change whatever TrueCrypt selects as cipher or cascaded cipher. It's important to note that this behavior with PBKDF2 is not some sort of bug, this is simply of how it is supposed to work.

In the case of TrueCrypt the KDF is the slowest part. This is good as the KDF should be slow to avoid fast cracking rates. However, as described previously, we can reuse the first 512 bits for the ciphers:
  • AES
  • Serpent
  • Twofish
The second 512 bits for the ciphers:
  • AES-Twofish
  • Serpent-AES
  • Twofish-Serpent
The final 512 bit for the ciphers:
  • AES-Twofish-Serpent
  • Serpent-Twofish-AES
To make use of this, oclHashcat will come with a 9th cipher mode that will always calculate 1536 bits and reuse them as it covers each combination of cipher or cascaded ciphers. For example when selecting the RipeMD160 hash, oclHashcat will calculate 1536 bits instead of 512. Therefore the amount of work items increase from 4 to 10 (512/160 and 1536/160, respectively), but on the other hand we can test all the ciphers at once! Otherwise we would need to calculate the key for all 8 ciphers which is a total of 53 work items. Finally this means we reduced the number of workitems from 53 to 10, which is a effective cracking speedup of 530%.

This feature will be available in the next version :-)

Maskprocessor restore?

$
0
0
Hello, 

I wonder if it's possible to use maskprocessor with restore option?

example:

Code:
mp64.exe -r 2 -1 ?u?d ?1?1?1?1?d?d?d?d?d?d | oclhashcat64.exe -m 2500 -a 3 hash.hccap --restore --session=Test


Thank you.

Table attack support

$
0
0
Any plans for adding support to cudaHashcat for Table-attack? I really want to dump JtR and that is pretty much the last thing that is holding me back. Unless someone has another way that I'm overlooking.

What about crypt8 ?

$
0
0
Commonly used by Whatsapp (android/iphone), the conversation database file called msgstore.db.crypt8 can be decrypted with a key file (android : /data/data/com.whatsapp/files/key) which contains an initialization vector and an AES-256-CBC key.

From my research I did not find any tool to bruteforce this file - without the key, of course.

Any toughs on this ?
Could hashcat able to do it in future versions ?

Thanks.
Viewing all 7674 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>