Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7675 articles
Browse latest View live

WPA (-m2500) brute force (-a3) locking up

$
0
0
With the most recent oclHashcat (2.01) and AMD GPUs every time I try and run a brute force attack (-a3) against a WPA hash (algorithm 2500) ocl will lock up. You can press the status key once and it will print out each GPU is running at 0 H/s. After you press status key once you do not get the prompt back.

Dictionary attacks work just fine. 

kill and kill -9 of the oclHashcat64.bin process does not do anything. The machine has to be rebooted to recover from the failure.

Its not really a critical bug for me, brute force attack typically yields nothing useful for WPA. However I figured you may want to know about the issue.

Details:
Debian kernel 3.16.0-4
fglrx 15.20.3
oclHashcat 2.01

Command line used:
oclHashcat64.bin -a3 -m2500 hash.hccap

Could someone help me crack a simple sha256

$
0
0
Hi, 

I've been trying for nights now to crack this hash:

<redacted>

It is a number between 0.0001 and 99.9999 and it may or may not have a % sign after it for example 10.1531%

I would really appreciate it if someone could help me learn how to crack this and similar hashes.

I have a word list which contains all of the numbers.

Help Please

$
0
0
Hi could someone please help me to crack a hash?

It's a simple password that could be anything between 0.0001 or 99.9999 it increments by 0.0001. It might have a % sign at the end and it might be a "," instead of a "." 

I would really appreciate it if someone could teach me how to do this. I have a word list with all of the numbers.

Need help with cudaHashcat and Kali

$
0
0
Hello, I've been trying to find directions on how to install Nvidia drivers and the CUDA toolkit for cudaHashcat but each site recommends different ways. This is what I've done so far:

apt-get update
apt-get dist-upgrade
apt-get install -y linux-headers-$(uname -r)
apt-get install nvidia-kernel-dkms

This from the Kali documentation for installing NVIDIA drivers. nvidia-kernel-dkms actually gives me an error saying it does not support the card I have (GeForce GTX 260). It recommended a legacy pacakge. I installed the legacy package and things went OK. Then the Kali website provides instructions on how to disable the "Nouveau" driver which I presume is the default video driver. It says to modify a line in "/etc/default/grub" which does not exist in my Kali 2.0 distro. I looked up what GRUB is, and it appears to be a boot manager. I'm using Kali 2.0 USB Persistence so I suppose this is why GRUB does not exist. So I completely skipped this step and rebooted. "glxinfo" says direct rendering is on. Then the Kali documentation says to go to /usr/share/oclHashcat-plus which does not exist in Kali 2.0 either. So I downloaded the latest cudaHashcat from the website and proceeded to run it. An error popped up saying it could not find "libcuda.so.1" which I believe is from the CUDA toolkit. Now I believe this toolkit has to be installed separately from the video driver? So i tried "apt-get install libcuda1" and it went through but still get the error saying the libcuda.so.1 is missing. Not only that, I don't believe "libcuda1" is compatible with the GTX 260 legacy driver I installed (which I think is 3.40). Can anyone tell me how I can get this to work? I'm using a GeForce GTX 2.60 and Kali 2.0.

Decrypt Htpasswd ?

$
0
0
Hey,

Can you decrypt this : <redacted>
Thanks you.

[sort of] Known password - which method?

$
0
0
Hey all-
   I'm trying to solve a passphrase used on a Mac running Mavericks (10.9, so it's SALTED-SHA512-PBKDF2.)  I already know the two words used, but it's possible that numbers/symbols are inserted where the vowels are. For example, the two words used are "bear" and "hater." (If you've seen the Colbert Report, you'll understand! Wink
However, it could be "b3@rhater," "BeArh@t3R," "bearHater" etc. etc. 

Assuming only the vowels "e" and "a" are replaced by symbols and some letters may or may not be capitalized... how do I even begin?

Password server

$
0
0
Could anyone advise if the dell Alienware Area-51 with Dual GTX 980 Ti (NVIDIA SLI Enabled), will do for this job well? Any other readymade solution someone could buy?

Always exhausted - with correct password and correct handshake

$
0
0
Hello,

I use oclhashcat (newest version) and the password could not be found.

The password is in the password list.

Session.Name...: all
Status.........: Exhausted
Input.Mode.....: File (C:\Users\XXX\Desktop\X.lst)
Hash.Target....: XXXXX (XX:XX:XX:XX:XX:XX <-> XX:XX:XX:XX:XX:XX)
Hash.Type......: WPA/WPA2
Time.Started...: Sun Jan 31 12:43:39 2016 (1 sec)
Time.Estimated.: 0 secs
Speed.GPU.#1...:        0 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 1/1 (100.00%)
Rejected.......: 0/1 (0.00%)
HWMon.GPU.#1...:  0% Util, 40c Temp,  0rpm Fan

Started: Sun Jan 31 12:43:39 2016
Stopped: Sun Jan 31 12:43:41 2016

Also with your WPA example file:

Session.Name...: all
Status.........: Exhausted
Input.Mode.....: File (C:\Users\XXX\Desktop\Example.txt)
Hash.Target....: hashcat.net (00:25:cf:2d:b4:89 <-> b0:48:7a:d6:76:e2)
Hash.Type......: WPA/WPA2
Time.Started...: Sun Jan 31 13:00:41 2016 (1 sec)
Time.Estimated.: 0 secs
Speed.GPU.#1...:        0 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 1/1 (100.00%)
Rejected.......: 1/1 (100.00%)
HWMon.GPU.#1...:  0% Util, 40c Temp,  0rpm Fan

Started: Sun Jan 31 13:00:41 2016
Stopped: Sun Jan 31 13:00:42 2016

Settings:

[Image: settingsn7sj3.jpg]


Best regards

Millenium251

How to apply optimizers?

$
0
0
Hi, everyone

I've got a message from cudaHashcat about optimizers available, but how do I enable them?
Couldn't figure out from help and forum.

The message was:
Quote:Applicable Optimizers:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt

oclHashcat benchmark with Apple CPU + GPU

Shrinking mask attacks

$
0
0
Hello! I've got a password I'm trying to crack in a reasonable amount of time, however it's quite long. There are a few rules for the password I could use a hand with setting up right. Here's what I have so far:


Code:
hashcat -m 10 -a 3 -1 ?l?u?d?s --increment --increment-min=10 -o C:\Hashcat\One\cracked.txt C:\Hashcat\One\hash.txt ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
^ with a salt 30 digits long if it matters
However I would like to be able to limit it so that It must contain at least one number and
it cannot contain the same symbol (letter or number or special) more that twice in a row (no aaa or 222.)

Also, it seems like even with these restrictions it will likely be a very long comp. time, any suggestions?

38 symbols password limit

$
0
0
Hi.
I would like to know if there are any plans on "upping" the limit for the password length?

When a hash has long salts it may prevent from recovering the password.
Thanks!

ecryptfs H/s

$
0
0
Hi there,

I'm currently investigating the possibilities to bruteforce an ecryptfs hash (http://cybermashup.com/2015/08/25/how-to...passwords/).

After extracting the hash I ran a benchmark using a wordlist of over 1 billion (1x10^9) words. The complete process took over 4 days (+/- 3300 H/s). Given the fact that nothing is known about the hash (except for the length probably being 8, 9 or 10 characters), I want to try all possible combinations of 8, 9 and 10 character passwords, containing upper case, lower case, digits and special characters. That would give me 95^8, 95^9 and 95^10 possibilities to try.

Needless to say that by the time this process is done and/or the password is found, chances are I won't be around anymore ;-)

Questions:

1. Is finding ecryptfs hashes really much slower than finding other hashes?
2. Can I speed up the process (more hardware and/or smart thinking)?

Normally I would not bother to ask, but finding the hashed password is really important because of personal reasons and all input is greatly appreciated!

Q

Any way to do this type of hash type?

$
0
0
I got a hash is generated via sha1(sha1($salt).sha1($pass)).  Can I use hashcat to find the password in this case?  Thanks.

Hashtopus Docker

$
0
0
I've built a dockerfile for putting hashtopus in a container which may come in handy for some of you:


Dockerfile:

Code:
FROM ubuntu:latest

ENV dl_link http://hashtopus.nech.me/beta/hashtopus147.7z
ENV db_root_pw v3rys3cur3!!1!
ENV db_host localhost
ENV db_pw s3cur3!!1!
ENV db_user hashtopus
ENV db_name hashtopus

RUN apt-get -y update
RUN apt-get -y install php5 php5-fpm wget p7zip-full nginx

RUN bash -c "debconf-set-selections <<< 'mysql-server mysql-server/root_password password $db_root_pw'"
RUN bash -c "debconf-set-selections <<< 'mysql-server mysql-server/root_password_again password $db_root_pw'"

RUN apt-get -y install mysql-server
RUN apt-get -y remove apache2

RUN wget $dl_link && mv *hashtopus* hashtopus.7z
RUN mkdir hashtopus && mv hashtopus.7z hashtopus && cd hashtopus && 7za e hashtopus.7z && rm hashtopus.7z
RUN mkdir -p /var/www && mv hashtopus /var/www
RUN chown -R www-data:www-data /var/www

WORKDIR /var/www/hashtopus
RUN ls -la
RUN sed -i "s/dbhost=\"localhost/dbhost=\"$db_host/g" dbconfig.php
RUN sed -i "s/dbuser=\"database user/dbuser=\"$db_user/g" dbconfig.php  
RUN sed -i "s/dbpass=\"database password/dbpass=\"$db_pw/g" dbconfig.php  
RUN sed -i "s/dbname=\"database name/dbname=\"$db_name/g" dbconfig.php  

RUN mv hashtopus.sql hashtopus_part2.sql
RUN echo "CREATE DATABASE $db_name;" >> tmp_hashtopus.sql
RUN echo "CREATE USER $db_user@$db_host IDENTIFIED BY \"$db_pw\";" >> tmp_hashtopus.sql
RUN echo "GRANT ALL PRIVILEGES ON * . * TO $db_user@$db_host;" >> tmp_hashtopus.sql
RUN echo "use hashtopus;" >> tmp_hashtopus.sql
RUN cat tmp_hashtopus.sql >> hashtopus.sql && cat hashtopus_part2.sql >> hashtopus.sql

RUN rm /etc/nginx/sites-enabled/default && rm /etc/nginx/sites-available/default
ADD hashtopus_nginx_conf /etc/nginx/sites-available/hashtopus
RUN ln -s /etc/nginx/sites-available/hashtopus /etc/nginx/sites-enabled/hashtopus

WORKDIR /

RUN apt-get -y install php5-mysql
ADD startup.sh startup.sh
RUN chmod +x startup.sh

CMD /startup.sh || true; nginx -g 'daemon off;'

hashtopus_nginx_conf:
Code:
server {
   listen     [::]:80 default_server ipv6only=on;


   root /var/www/hashtopus;
   index admin.php index.php;

   server_name localhost;

   location / {
       try_files $uri $uri/ =404;
   }

   error_page 404 /404.html;
   error_page 500 502 503 504 /50x.html;
   location = /50x.html {
       root /usr/share/nginx/html;
   }

   location ~ \.php$ {
       try_files $uri =404;
       fastcgi_split_path_info ^(.+\.php)(/.+)$;
       fastcgi_pass unix:/var/run/php5-fpm.sock;
       fastcgi_index index.php;
       fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
       include fastcgi_params;
   }
}


startup.sh (used inside of the container)
Code:
#!/bin/bash

service php5-fpm start
service mysql start && echo "sql-errors are normal :S"  && mysql -h localhost -u root -p$db_root_pw < /var/www/hashtopus/hashtopus.sql || exit 0


To start the container, execute:

Code:
docker run -d -p 80:80 --name hashtopus hashtopus

what am i doing wrong?

$
0
0
Im trying to get the out put of the cracked hashes like this:
U: P
U: P
U: P

But there coming out like 
U: PU: PU: PU: PU: P

its doing my nut in lol

Efficiency Question - Wordlists or rules-on-the-fly

$
0
0
Hi,  I am new to cracking  I was curious is it more efficient to pipe wordlists that are already compiled together with rules or to use hashcat to append/alter a smaller wordlist and have the rule applied as needed?


This is not an either or question  but rather a question if generating extensive wordlists allows for more speed.


I think there a pros and cons to both


Relying on a small wordlist and altering it with rules  requires less preparation time  ( less words in the list )  but for each new hash to be cracked it would have to restart the rule sequence.

A large wordlist with the rules already applied requires more preparation however it seems to me it should be quicker  as it doesn't have to process a function for each word.


Anyways  looking for anybody who has practical experience in these matters, I'm  just a padawan looking for a Jedi .



Thanks!

oclHashcat and "--outfile-format=NUM"

$
0
0
Hi guys,

Using oclHashcat, is it possible in the output file to have as delimited character the “tab” character instead of the “:” ?

I have seen the “--outfile-format=NUM”, but we can have only 15 predefined formats. Is it possible to have customs formats?
 
Regards





12468

Done my research, now I need a review. 20 GPU cracking cluster.

$
0
0
Hi all!

First off...  yes.  This is a serious post.

I won't bore you with the details, but essentially I've been tasked by my team at work to create a password cracking solution and have a budget of up to $30,000.  I've looked into using PCIE extenders, but those seem to be disliked by the community (price/return thing I guess).  Anyways, I did a bit of research and came up with a solution that I think would fit our needs.  It consists of five hosts with four GTX 980 TIs each.  The five hosts would be clustered to distribute the load.

I'd like to get some opinions from the crowd here since you are all pretty much the experts when it comes to hardware builds for this kind of thing.  Below is the config.  Feel free to rip it apart, and if you have any concerns, PLEASE post some details as to why.  

Each host will be identical, and contain the components below.  They will be located in a datacenter with the front facing a cold aisle:

Component     Quantity    Description
Case          1           Xigmatek Elysium CCC-HSA0DS-U01
PSU           2           Corsair HXi HX120i
Motherboard   1           MSI Gaming X99S Gaming 9 ACK
CPU           1           Intel Core i7-5930K
Memory        1           G.Skill Ripjaws 4 DDR4 2133 64GB (8x8GB)
GPU           4           Gigabyte GeForce GTX 980 Ti GV-N98TG1
SSD           3           Mushkin Enhanced Reactor 1TB SATA III
CPU Cooler    1           Zalman CNPS9900MAX-B

I'd really appreciate any feedback you all can offer.  If you are especially helpful, I'll be sure to put a badge on one of the boxes with your username on it.

Why max 128

$
0
0
Why is the magic number upto 128 gpu?
Viewing all 7675 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>