Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7675 articles
Browse latest View live

Build Help

$
0
0
I currently own a R9 290 Tri-x and a Radeon HD 7850 and I'm looking components to make it work with expansion options.
I have a 230W power supply (or so) that needs an upgrade (is 5 years old) so I need some advise on that.
I have an i7 processor and a motherboard with 1 PCIx16 and 3 PCIx4.



So in conclusion I need help deciding:
  - Power supply
  - Motherboard?
  - GPU's?


I want to be able to expand or add more GPU's later when required.
Money's not a direct issue here, I'm just looking for builds to work towards and get it working quick.

Hashcat v 0.50 "increment error"

$
0
0
Trying to do a bruteforce attack (maskattack) for vbulletin<3 with following code:

Code:
hashcat-cli64.exe -a 3 -m 2611 --pw-min=3 --pw-max=6 -e "D:\salt3_32" -p : -o "D:\Hashcat_050\1121_found.txt" --outfile-format=3 --remove -n 12 -c 64 "D:\list\1121hashes" -1 ?l?d ?1?1?1?1?1?1

With Hashcat 0.49 no problem
With hashcat 0.50 increment error

Is there anything wrong in the command line??

thank you

tibit

No support for SHA512(Unix) passwords over 16 characters?

$
0
0
So, I don't think this was ever added. I wanted to bring it up both to make sure I'm right, and bring it to someone's attention in case it got overlooked.

In oclHashcat-plus v0.15 support for passwords longer than 15 characters was added with the exception of...
Quote:
  • modes 500, 1600, 1800, 3200, 5300, 6300 and 7400 are limited to 16 characters
NOTE: We're planing to remove the limits for these modes in the next version.

The next version turned into oclHashcat v1.00. It doesn't appear that the limits were removed in this version, or any later versions of oclHashcat that I can find. However, in hashcat v0.48 they were removed for the CPU powered version.

I'd post this on Trac, but it doesn't seem to want me to register. (Warning: You must specify a valid email address.)

Getting status of job that is run with nohup

$
0
0
Can anyone offer some guidance on feeding the character, "s" (without the quotes) to a nohup'd oclHashcat process?  I would like to get a status update sent to either nohup.out (or even the oclHashcat log file).

I can run "pidof oclHashcat64.bin" and get a pid (in Linux, of course).

If I try this, it doesn't give me a status update.  I am following nohup.out with "tail -f nohup.out"

echo s > /proc/8797/fd/0
(8797 would be the pid)

I don't see a status update sent to nohup.out

I am running this on Ubuntu.  My understanding is that /proc/pid/fd/0 is not stdin on all Linux systems and this appears to be the case for Ubuntu.

Any guidance is appreciated.  Thanks.

PLEASE HELP!_MASK with 8-20 abcABC123...

$
0
0
Hello!

I am new with hashmask and was studying how to use the program the whole night.
My english is not so good but i was learning a lot.

My last problem is how to use the right mask!

I think to increment (in the past: --increment-min/max=NUM) has changed to: pw-min/pw-max=NUM) -  or do i misunderstand this?

To do a mask with 123456789 or abcde... or ABCDD i know how.
A lot of details are in your FAQ and Manuals- but i don't get the logic how to make a mask with the parameters of minimum 8 characters to maximum 20 charakters with various digits and abc../ABC.. - but WITHOUT the -a function and all the special signs !"§$%....

I know- a lot of you will maybe laugh at that question- but i hope somebody will answer me.

Thanx.

Separator Unmatched on -m 2811?

$
0
0
Greetings I'm trying to recover a IPB 3 password, and for some reason it errors me with "Separator Unmatched", I suspect it's because of the salt, "1~C$:", it includes stuff such as ":" and "$" and isn't there any way or rule I can use to ignore ":"?

HD6870 & HD5970 with WPA

$
0
0
Hi, I have a setup with both of these cards installed in my system, but
I have a problem with the gpu kh/s speed

Session.Name...: oclHashcat
Status.........: Aborted
Input.Mode.....: Pipe
Hash.Target....: blah blahblah
Hash.Type......: WPA/WPA2
Time.Started...: Tue Nov 24 10:57:38 2015 (7 mins, 22 secs)
Speed.GPU.#1...:    31419 H/s
Speed.GPU.#2...:    41184 H/s
Speed.GPU.#3...:    45672 H/s
Speed.GPU.#*...:   118.3 kH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 56033280
Rejected.......: 0
HWMon.GPU.#1...: 44% Util, 79c Temp, 41% Fan
HWMon.GPU.#2...: 51% Util, 73c Temp, N/A Fan
HWMon.GPU.#3...: 43% Util, 81c Temp, 51% Fan

I have set the gpu loop to n 32 u 320.
Are these settings correct/acceptable or can I squeeze some more power out of the gpu's?

Multiple GPUs Help

$
0
0
I'm going to be getting new graphics cards for a desktop gaming/general workstation/hash cracker by night, So I'd like to get something that is able to reasonably perform in all these areas. I'm currently eyeing either 2x GTX970 or a single GTX980Ti for my build, the budget for graphics is about US$600-700.

It seems to me from online benchmarks that for the gaming side, 2x 970s will perform similarly to a 980ti, so that part is alright.

Based on benchmarks that I've seen around the forums, it seems that a single 970 performs at about 75% of the 980ti, in terms of hash speed.

Since 2x970 is approximately the same price as a 980ti, would the 2x970 be the better option then? I also understand that the TDP of the 2x970 is only 30W more than the 980ti, so it seems pretty comparable.

Also, on a side note, would cudahashcat be able to use both gpus if SLI was turned on? Or would I have to keep switching between SLI on/off whenever I wanted to switch from gaming to cracking...

How many combinations?

$
0
0
Hello everybody,
I'm wondering how many combinations would be possible if i'm using

Code:
mp64.exe ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d -q 3 -r 6

Does anybody know how to calculate this?

Count-words ?

$
0
0
Hey,

in the talk by T0XIC (Link), he presents the "count-words.pl"-utility. It seemed as if this was included in the hashcat utilities. However, I can't seem to find it anywhere. I'd really like to try out this tool.. Could anyone point me to where I can find it?

sql login

$
0
0
Hi!
Inspired by http://www.sqlservercentral.com/articles...ing/96540/
which has this example using an older version:
./oclHashcat-lite64.bin -m 132 -p : -o "/root/HashCat/oclHashcat-lite-0.13/SQL2008_passwords.txt" --gpu-temp-abort=100 --pw-min=4 --pw-max=12 -1 ?l?u?d?s <hash> ?1?1?1?1?1?1?1?1?1?1?1?1

I have downloaded oclHashcat-1.37
running on windows10 with AMD A10-7800 Radeon R7

I try to figure out the syntax for calling oclHashcat:
So i tried:
oclHashcat64 -m 1731 -a 3 -o "C:\Data\pw.txt" -1 ?l?u?d?s <hash> ?1?1?1?1?1?1?1?1?1?1?1?1



oclHashcat64 -m 1731 -a 3 -o "C:\Data\pw.txt" <hash>

But only get:
Session.Name...: oclHashcat
Status.........: Running
Input.Mode.....: Mask (?1?2?2?2?2) [5]
Hash.Target....: 0x0200df<deleted>...
Hash.Type......: MSSQL(2012)
Time.Started...: Fri Nov 27 16:59:33 2015 (1 sec)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 34727.9 kH/s
Speed.GPU.#2...: 43060.3 kH/s
Speed.GPU.#*...: 77788.2 kH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 104136192/104136192 (100.00%)
Rejected.......: 0/104136192 (0.00%)
HWMon.GPU.#1...:  0% Util, -1c Temp, N/A Fan
HWMon.GPU.#2...: 41% Util, -1c Temp, N/A Fan

e.g. no pw recovered.

Should I change parameters?
Other things that could be wrong?
BR
Bjorn

.onion domain brute

$
0
0
you can do support this algorithm? Tor network .onion domain name
A programm "scallion" opensource generate the desired domain-name, but does not support more than 1 videocard Sad
Scallion soft and source: https://github.com/lachesis/scallion
If you can, please add this algorithm in hashcat!

.zip archive add support

$
0
0
Please add support bruteforce .zip archive (not 7-zip, and not rar)

Signature Unmatched

$
0
0
xxxx8bbbxxx2f165b051998cf2bexxxxxxxxxxc18697dxxxx9 is my hash.
HashID said it was Citrix Netscaler and its mode was 8100
My command is oclHashcat64.exe -m 8100 -outfile=cracked.txt --remove hash.txt wordlist/

Help please

Problem with Hashcat and large hashlists

$
0
0
Whenever I try to crack very large hashlists (50-100k unique hashes and larger) I get massive lag when I start the attack and for the first 30 seconds I cant even update the status screen. The cracking speed also starts extremely slow and builds up slowly to about full speed after 1-2 minutes.

I have tried using an output file, disabling/enabling the potfile and tried a few different hashlists & dictionaries.

I am using the Nvidia version of oclHashcat with 2 x GTX 970s.
Any suggestions are much appreicated.

Restore Point reset while mask processing

$
0
0
hey

I've some trouble with the restore file.
I'm losing all my progress on the current charset when I quit hashcat in the first ~15 seconds.

Further analysis has shown, that the current position within the specific charset of the maskfile is 0 while the mask is processed.

The status view looks like this:
Progress.......:   4041834496/8031810176 (50.32%)
Rejected.......:   0/4041834496 (0.00%)
Restore.Point..: 0/308915776 (0.00%)

After the mask is processed the restore point gets loadeds and saved correctly

Progress.......:   4044931072/8031810176 (50.36%)
Rejected.......:   0/4044931072 (0.00%)
Restore.Point..: 155574272/308915776 (50.36%)

When I quit hashcat while the mask is still processed the restore point 0 is saved to the file and the progress is lost.


Question to the devs: Would it need a big efford to change to order of those operations?

Adding to .pot file

$
0
0
There are sources of newly cracked hashes:passwords. It seems that it would be a time saver to save these hashes:passwords in the .pot file as the work has already been done finding these hash:password pairs. 

Is this a wise or good thing to do? Your thoughts?

Need full guide on WPA/WPA2 Hashcat cracking

$
0
0
I can't find a full guide on how to successfully crack WPA/WPA2 using the CPU version of hashcat. I would greately appreciate it if anyone could tell me where I can find one. As I am new to hashcat, I also wanted to know what would happen when the right password is found and where would it be saved.

oclHashcat Benchmark r9 390x

$
0
0
oclHashcat Benchmark r9 390x

Thank You

dictionary attack problem

$
0
0
in oclhashcat 1.37 with these options  -a 0 -m 1000 <my hashes> <my dic> take log time to crack .and not use gpu and gpu usage are 0.because of small dic.when i give oclhashcat a big dic it start cracking on gpu but again are so slow.take log time to progress.and one by one check the hashes.all test is on 4 r9 390x.

but when i test my hashes with that dic on hashcat-cli on cpu it take 2 minutes to crack all of them.and the speed are amazing.

i use -r rules/.... all of them not work on gpu and again speed was horrible.

what is the problem ??
Viewing all 7675 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>