Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

oclHashCat on OS X

$
0
0
Hi,


I heard that there has been an update regarding making oclHashCat usable on OS X.  Is this true, and if so, was there any sort of announcement that I just wasn't able to pull up?  Thanks,

Jon

Help with hash type.

$
0
0
Ignore the title..

I have a sha512($password.$salt) It's (128:128) chars.

I edited the hashcat source.h to allow salts of 128 chars and it doesn't crack a known password, so I'm wondering how can I crack 128char salts? it doesn't work on passwordspro either.


Tried it with insidepro's hashmanager and it worked.. but slow speeds Sad

edit: https://hashcat.net/wiki/doku.php?id=fre...alt_length

sad times..

I'm getting 100P/s on hashmanager and with a shorter salt I get like 60k a second on hashcat Sad((

Ubuntu 16.04 - fglrx is deprecated - is "radeon" driver OK these days?

$
0
0
I've just built a fresh desktop with a Radeon R9 290X to use as an oclhashcat box =).

I've installed Ubuntu 16.04 on it. By default, Ubuntu uses the open-source "radeon" driver.

Reading online, most of the older articles seem to suggest replacing this with AMD's proprietary "fglrx" driver.

However, the Ubuntu 16.04 release notes (https://wiki.ubuntu.com/XenialXerus/ReleaseNotes) suggest going with "radeon":

The fglrx driver is now deprecated in 16.04, and we recommend its open source alternatives (radeon and amdgpu). AMD put a lot of work into the drivers, and we backported kernel code from Linux 4.5 to provide a better experience.

Out of curiosity - is it still the advice to replace "radeon" with "fglrx"?

Or have things changed, and it's now OK just to use the standard "radeon" driver that comes out of the box?

Error oclhashcat64 clCreateCommandQueueWithProperties

$
0
0
Hi everyone. I just upgraded from a Radeon 6950 to an eVGA GTX 980. I installed the latest drivers from the nvidia drivers. I'm getting this error when I try to run oclhashcat64:



---------------------------
oclHashcat64.exe - Entry Point Not Found
---------------------------
The procedure entry point clCreateCommandQueueWithProperties could not be located in the dynamic link library c:\oclHashcat-2.01\oclHashcat64.exe.
---------------------------
OK   
---------------------------

Slow WP?

$
0
0
I have 45 WP hashes.

nVidia GeForce GTX 980 with the newest drivers (364.72)

is this slow?

Quote:Session.Name...: raw14
Status.........: Running
Input.Mode.....: Mask (?d?d?d?d?d?d?d) [7]
Hash.Target....: File (hash.txt)
Hash.Type......: phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla)
Time.Started...: Mon Apr 25 17:03:55 2016 (19 secs)
Time.Estimated.: Mon Apr 25 17:13:52 2016 (8 mins, 34 secs)
Speed.GPU.#1...:   860.4 kH/s
Recovered......: 0/45 (0.00%) Digests, 0/45 (0.00%) Salts
Progress.......: 16515072/450000000 (3.67%)
Rejected.......: 0/16515072 (0.00%)
Restore.Point..: 0/1000000 (0.00%)
HWMon.GPU.#1...: 99% Util, 59c Temp, 3358rpm Fan

Problems with formatting

$
0
0
Output hashes are printed like this:

http://prntscr.com/awtdgq

Rather than a list like this:

http://prntscr.com/awte0w

This makes it very hard to read, I don't think its normal. Also, only when using --remove, the hash file turns into a jumbled mess like the first picture. Anyone have an answer please? Thanks.

Dell Precision (w/M1000M)

$
0
0
Hey all,

I'm looking into getting a new laptop for on-site testing, that is, away from the office. To that end, we are looking at the Dell Precision workstations, chuck a load of ram in it, SSD - mainly so that I can run a few VMs at the same time and swap between them with little aggro.

A thought struck me, after using our old friend responder.py, it may be really handy to run some cracks against the netNTLM network hashes you (generally) gather. Checking out the Quadro 2GB DDR5 M1000M on notebookcheck has this to say:

1st generation Maxwell
512 shaders running @ 993 - 1072 MHz
128-bit bus.

they conclude: "As the exact clock speed is not known, we can only speculate on the performance. However, it is a lower mid-range model from 2015 from the Quadro line. It should be slower than the GTX 950M in 3D gaming, but easily outperform the Quadro K1100M"

That being said, I know it's a mobile card, and a Quadro one to boot, as it's for CAD guys with the certified drivers. I know you're all about the 970 and above here (and for good reason it seems).

So, whilst I know this isn't a great card, is it even worth running hashcat on this, on site, if I'm there for a day or so, against a common hashtype that I'm likely to find (netNTLMv2)?

Does anyone have experience running Dell Precision laptops with this kind of abuse? I saw epixoip made sure to buy a laptop with good heat transfer; however, hashcat isn't the primary reason for this machine, would just be a 'nice to have' or am I better off just not using something substandard.

Cheers.

oclHashcat v2.10 performance questions?

$
0
0
Version of oclHashcat is "v2.10 beta 192"

When cracking -m=5500 NetNTLMv1. The following results are extremely different! 

Running benchmark, speed is 1218.2 MH/s.

Code:
./oclHashcat64.bin -m 5500 -b --opencl-device-types 1

oclHashcat v2.01 (gaef8dc2) starting in benchmark-mode...

Device #1: GeForce GTX 970, skipped
Device #2: Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz, 8016/32065 MB allocatable, 2400Mhz, 24MCU

Hashtype: NetNTLMv1-VANILLA / NetNTLMv1+ESS

Speed.Dev.#2.:  1218.2 MH/s (82.75ms)

Started: Wed Apr 27 16:17:57 2016
Stopped: Wed Apr 27 16:17:59 2016


Using wordlist, speed is 4558.7 kH/s!!! Its too slow! 

Code:
./oclHashcat64.bin -m 5500 /home/pptp.txt /home/dict_20160122.txt --opencl-device-types 1

oclHashcat v2.01 (gaef8dc2) starting...

Device #1: GeForce GTX 970, skipped                        
Device #2: Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz, 8016/32065 MB allocatable, 2400Mhz, 24MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Precompute-Final-Permutation
* Not-Iterated
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger disabled

Device #2: Kernel /home/oclHashcat-2.10b192/kernels/m05500_a0.9b12b1e1.kernel (492680 bytes)

Cache-hit dictionary stats /home/dict_20160122.txt: 4473009478 bytes, 397531497 words, 397531497 keyspace

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit => s

Session.Name...: oclHashcat
Status.........: Running
Input.Mode.....: File (/home/dict_20160122.txt)
Hash.Target....: XXXXXXX::::XXXXXXXXXXXXXXXXXXXXXXXXXX...
Hash.Type......: NetNTLMv1-VANILLA / NetNTLMv1+ESS
Time.Started...: Wed Apr 27 16:17:41 2016 (2 secs)
Time.Estimated.: Wed Apr 27 16:19:09 2016 (1 min, 25 secs)
Speed.Dev.#2...:  4558.7 kH/s (0.96ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 8848352/397531497 (2.23%)
Rejected.......: 992/8848352 (0.01%)
Restore.Point..: 8836064/397531497 (2.22%)
HWMon.GPU.#2...: N/A Util, N/A Temp, N/A Fan

I remember that hashcat v2.00's speeds of Straight and Brute-force mode do not have such difference, for example, benchmark speed is 190Mh/s and Straight mode is 80Mh/s.

Why the speeds are so different on oclHashcat v2.10?

Problem with the "add wordlist" button

$
0
0
Hi everybody
I installed yesterday the HashCat GUI v0.45b1 on my windows 8, i tried to upload wordlists .txt or .dic by clicking on "add wordlist" button on the section "Wordlists and Markov" but no wordlist was uploaded nor .txt neither .dic, what's the problem in your opinion ? what should i do to solve it ? Thank you in advance for your help.

Ubuntu 16.04?

$
0
0
Hello everyone,

as suggested on your guides, I'm currently using Ubuntu 14.04.
Since the new LTS version is out, do you think it would be safe to update to the latest release?
Anyone did that? Are there any known issues?

GPU high temperature. How to decrease it?

$
0
0
Is there a way to reduce speed of bruteforcing in order to lower gpu temp? I didn't find any of this options in cudahashcat. Thank you.

Error ERROR: clGetDeviceIDs() -1

$
0
0
I put back in my Radeon 6950 after removing my 980 and uninstalling nVidia drivers, I installed the new Radeon Crimson Edition software and drivers and now I'm getting the error in oclhashcat64:

Code:
Generating bitmap tables with 16 bits...

ERROR: clGetDeviceIDs() -1

Clarifying Attack Type for PW Type

$
0
0
Hello all,

I am fairly new to this but have read through the Wiki and tutorial and wanted to make sure I'm understanding the various approaches correctly. I'm taking a cyber security course and learning about passwords and hashes, and wanted to try this on my own using my home network for testing.

I was able to capture the handshake for my home network and have the hccap file. For testing purposes, I put my password into the middle of a large word-list and I was able to get the dictionary-style attack to work.

My main question is, since my password is a bunch of random characters (for example: 8Gy69BZs), would I want to try to use a Brute-Force style attack for that?

Based on the wiki, it looks like I should run the following:

oclHashcat64.exe -m 2500 -a3 capture.hccap ?d?d?d?d?d?d?d?d

Am I correct in understanding this will run through every potential character and eventually should find my example password above? I know this would probably take a substantial amount of time, but if I'm on the right path I'd like to create a new password that's shorter just to test.

Sorry if this answer is already well explained somewhere, I've been trying to keep up but there's a lot to keep track of Sad

Need help with mask

$
0
0
Hello

I hope I posted this in correct subforum. If I did not, I apologise.

I need help with setting up attack for oclhashcat like this:

password contains lower alpha and digits
8 characters in length
password contains exactly 2 digits placed randomly

Is there any way to do it? If so, how?
Thank you in advance. I am not very experienced with this and will appreciate your help.

EDIT: could this be done using maskprocessor using "-r" ?

hashcat beta and ubuntu 16.04 summary

$
0
0
There have been many issues reported when installing Ubuntu 16.04 and the latest beta (which is also the future release). 

I've installed it myself to see what's going on. 

Here we go:
  • Make sure to install Ubuntu 16.04 server as minimal as possible. No X11, no drivers, etc.
There's ultimately just one package you need:
  • ocl-icd-libopencl1
Additionally, if you compile from GitHub source (otherwise you can skip this):
  • opencl-headers
And that's it for the base. Now, depending on your hardware you need to install:

For NVidia's GPU:
  • nvidia-361
  • nvidia-opencl-icd-361
The default depencies of additional 350+ packages shocked me. You totally do not need them. 
If you install those packages, you really want to do it like this: 

Code:
$ apt-get install --no-install-recommends nvidia-361 nvidia-opencl-icd-361

Tripple check you did not install any other packages that begin with nvidia-*

For AMD's GPU:

You typically do _not_ want to install Ubuntu 16.04 because AMD stopped updating catalyst driver, also for the future. The latest Ubuntu that supports Catalyst is 15.10. AMD user have to decide to either switch Windows or use the OSS drivers. However, they are multiple times slower than Catalyst. If you absolutely want to stick to linux you need to switch to nvidia or wait and pray for better drivers. You have been warned.
  • mesa-opencl-icd
For AMD CPU:

Support is part of catalyst, which you can't install anymore. Therefore your last escape is to use pocl, which also does not exist as a Ubuntu package. You need to clone it from GitHub and compile it yourself.

For Intel's GPU:
  • beignet-opencl-icd
For Intel CPU:

There's no ubuntu package, you need to install Intel's OpenCL SDK yourself (which is great!)

Do I need to do pipes for my GPU cracking?

$
0
0
So I am using a file with several 8 letters long masks like ?l?l?l?l?l?l?l?l. I was wondering if I need to make the piping technique for my gpu to have the full speed, or is it having a long mask does not require me to do it.

Sorry if this is an old question.

Thanks

bypass hashcat

$
0
0
Hello
Is it possible for me to explain to simply bypass your application
Bypass when running crack in hashcat?
TNQ

Generating a SHA256 Hash from another Hash

$
0
0
Hello,
      First off I am a complete noob at all of this and know very little about SHA256 Hash and have been trying to read up and learn what I can about it. I have read that SHA256 Hash are very hard to crack and was curious if it would be a good idea to generate a hash from a hash. Since it would be just as random and it would be 64 char that would have to be figured out seems like it would be unbreakable to me. Or am I mistaking? Would generating a hash from another hash be easy to crack since you knew which char the first hash generated? Hopefully this makes sense.

Example of what I am talking about.

Starting Hash

bc6f622525292996fbd592a1dcdaf7de33c8f2983d223a62a34f13d36390c05f

Then using the above hash to generate this hash.

72b9552553f31ee99d8a3b37c4150dd8966d487b47d1cfd0eabed80b2cc9f355

Then using the above hash to generate this hash.

154fd351815b5350bb99a98b1948d14eb7bb0c503a2f216e3c7e15af953df406

Is this a strong way to protect your hashes or easily reverse since you know which characters are being used to produce the following hash?

Nvidia DGX-1 Compatibility

cudahascat bug?

$
0
0
When I am cracking wpa2 with an hccap file I normaly see the hash.target: output like that:   
 essid: access point mac <-> station mac    

but this time its:
essid: station mac <-> access point mac   ...

this a picture showing that the bssid and the mac of the station are swapped.
https://goo.gl/photos/sQnM9QJUk8kfLAzY6

Is it normal or something is wrong with hccap file? Do the bssid and the station mac orther realy mater?
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>