Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8126 articles
Browse latest View live

GPU-Device missing

$
0
0
Hello,

i have one problem with the new hashcat3.00.

It works fine, but i can see only 1 device (CPU).


But where is my second device, the GPU? I have Windows 7 32 bit, Radeon HD 5770 and the newest driver from AMD (16.2.1).

I want to use my GPU.


Can someone help me?


Thanks a lot!

Greetings Cat2016

Best strategy, attack mode or rules for certain password structure

$
0
0
Is there a way to setup hashcat to find Tc passwords that have been constructed according to the structure exemplified below?

CBA321cba321??

That is three upper case letters followed by 3 digits. And then the same letters as before but lowercase followed by the same digits and then two special characters.

Andy

Bitslice DES S-boxes with LOP3.LUT instructions

$
0
0
I've been working on implementing a specific algorithm. Everything works, thanks to amongst others, some very useful tips and hints from the forum Smile

On a Titan X (3072 cores), the algorithm runs @~360M/s. This sounds good but in fact it isn't: my basic C++ OpenSSL based CPU code runs @~1M/s on an outdated CPU (1 core). I've isolated the time consuming code: it's the DES implementation I'm using, the one that's also used in e.g. m=3100. A quick test reveals that all algorithms that use this DES implementation are relatively slow.

I've also found that some other algorithms like m=3000 (LM) use a different DES implementation, "Bitslice DES S-boxes with LOP3.LUT instructions". Based on what LM does and the benchmarks speed, this code seems to be significantly faster. Using the code seems to be the way forward for me, to crack crypto data of the algorithm I'm using in a reasonable amount of time. For me as an amateur coder, the LOP3.LUT code is not easy to read / understand though... So I've got two questions:

- Any educated guesses about the speed of a raw DES of the code used in m=3000 versus m=3100?
- Can someone give me some pointer about how to get from the current code in m=3000 to something close to 'keydata = setkey(key)' and 'out = crypt(in, keydata, mode)'?

Thanks a bunch!

GTX980 vs GTX1080

$
0
0
Calculation powers;
Gtx980 4.6 TFlops
Gtx1080 9 TFlops


hashcat64 -b -m 2500
hashcat (v3.00-1-g67a8d97) starting in benchmark-mode...
OpenCL Platform #1: NVIDIA Corporation
- Device #1: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU
Hashtype: WPA/WPA2
Speed.Dev.#1.:   415.1 kH/s (94.61ms)
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
hashcat64 -b -m 2500
hashcat (v3.00-1-g67a8d97) starting in benchmark-mode...
OpenCL Platform #1: NVIDIA Corporation
- Device #1: GeForce GTX 980, 1024/4096 MB allocatable, 16MCU
Hashtype: WPA/WPA2
Speed.Dev.#1.:   224.9 kH/s (91.26ms)
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
hashcat64 -b -m 2500
hashcat (v3.00-1-g67a8d97) starting in benchmark-mode...
OpenCL Platform #1: NVIDIA Corporation
======================================
- Device #1: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU
- Device #2: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU
Hashtype: WPA/WPA2
Speed.Dev.#1.:   417.4 kH/s (94.67ms)
Speed.Dev.#2.:   414.8 kH/s (95.83ms)
Speed.Dev.#*.:   832.2 kH/s

Segmentation fault on Mesa and AMDGPU

$
0
0
I am an Arch Linux user and attempted to run hashcat on my R9 290. However, on both the AMDGPU and Mesa drivers I am given this message:

Code:
hashcat (v3.00) starting in benchmark-mode...

OpenCL Platform #1: Mesa
========================
- Device #1: AMD HAWAII (DRM 2.43.0, LLVM 3.8.0), 256/1024 MB allocatable, 40MCU

Hashtype: MD4

Segmentation fault (core dumped)

I attempted to install the catalyst drivers this morning to no avail. As well, I have installed the opencl-mesa, opencl-headers, and ocl-icd packages in order to enable opencl support. I was under the impression that the Mesa drivers were working, is there something I'm missing?

Is this error 2xRX480 related?

Restore mode problems and cracking

$
0
0
I use the command hashcat --resume and sometimes it works other times it resets and goes back to generating dictionary which is a 1GB file.

Generating dictionary stats for zyzyzyzy-abababab.txt: 331944181920 bytes (32.17%),


I`m using hascat v 3.00 and I cant find the .recover file anywhere its as if its being stored in ram rather the HD.
Also on resume somtimes its just stuck on 23% and wont move after a reboot on my computer.

Also I`m only getting 100k passwords where at one point I used the commands

hashcat resume -n250 -u1020 -- resume and it shot up to 170K and my gpu hit 80-84C in temp.

device local mem size is too small, use anyway?

$
0
0
I have a GeForce 9800 Gt (old, but gets the job done for the games i play) and hashcat gives me the "device local mem size is too small" warning when i try to run an attack. If its just a warning, can i ignore that limitation and use hashcat on this device anyway? The --force option doesnt seem to do anything.

The only other post i could find with this issue was someone wanting to use their CPU instead, which i dont want to do out of heating concerns.

Running on 64bit windows 7 if that makes a difference.

Also, i registered just to ask this question and would like to say i love the 16 character password minimum. Of all the places to have such a large minimum, this is it.

Open Document Format

$
0
0
Is it possible to crack an encrypted odt file using hashcat? Or how would one go about doing it.

I found several documents online about how open document files are encrypted, but I couldn't figure out how to use hashcat to find the password.

When I extract the odt file I found that it contained the following content in the manifest.xml file:
Code:
<manifest:manifest xmlns:manifest="urn:oasis:names:tc:opendocument:xmlns:manifest:1.0" manifest:version="1.2">
<manifest:file-entry manifest:full-path="/" manifest:version="1.2" manifest:media-type="application/vnd.oasis.opendocument.text"/>
<manifest:file-entry manifest:full-path="content.xml" manifest:media-type="text/xml" manifest:size="4680">
 <manifest:encryption-data manifest:checksum-type="urn:oasis:names:tc:opendocument:xmlns:manifest:1.0#sha256-1k" manifest:checksum="s+g9HtqoVZZymr2ImwF3aC5eOEnemsrJVR2YiMeYHt8=">
  <manifest:algorithm manifest:algorithm-name="http://www.w3.org/2001/04/xmlenc#aes256-cbc" manifest:initialisation-vector="edJhIRt0sLfBmbIMaHYjxA=="/>
  <manifest:key-derivation manifest:key-derivation-name="PBKDF2" manifest:key-size="32" manifest:iteration-count="1024" manifest:salt="DXG+zcdMzxmblxZCs2uUTQ=="/>
  <manifest:start-key-generation manifest:start-key-generation-name="http://www.w3.org/2000/09/xmldsig#sha256" manifest:key-size="32"/>
 </manifest:encryption-data>
</manifest:file-entry>
Here is the password protected odt file if someone wants to try and crack it. If you are able to figure out a way of using hashcat to crack the password please let me know how.

4 Way Handshake

$
0
0
Hello,

Could anyone give me a short tutorial to capture a WPA2 4 Way Handshake?
I'm using windows.

tori

Problems with RAR archive

$
0
0
Hi everybody. So I have a RAR archive that I need to get the password to. I would be able to do this but this RAR archive is unlike anything I have previously seen. When you open the password protected archive, you can view the files just like normal. You are only prompted with a password upon extracting the files. I have tried multiple cracking programs. Hashcat, John the Ripper, and cRARk. When I use rar2john, a program supplied with John the Ripper to hash the given archive, it generates a very strange looking hash; one that doesn't work with either hashcat or John. cRARk immediately attempts to crack the first file in the archive. Any idea what to do next? Thanks!

Hardware review

$
0
0
Is there any problem with using an older IBM x3850 M2 server as a hash cracking rig.  I have a friend taking one out of production, and has offered it to me.  It has 7 PCIe X8 slots and duel 1440W power supplies, but they are redundant so I believe I am limited to one at a time.

Will a PCIe x16 card physically fit in a x8 slot?  I know I can use PCIe x1 risers if I need to.  Do you think I can get away with using three gtx 1070 cards with power supply or should I stick with two?

--opencl-device-types vs. reported Device #?

$
0
0
Running hashcat64.exe --opencl-device-types 1 gets:

OpenCL Platform #1: NVIDIA Corporation
======================================
- Device #1: GeForce GTX 970, skipped

OpenCL Platform #2: Intel(R) Corporation
========================================
- Device #2: Intel(R) Core(TM) i3 CPU         550  @ 3.20GHz, 4061/16247 MB allocatable, 4MCU


While running hashcat64.exe --opencl-device-types 2 gets:

OpenCL Platform #1: NVIDIA Corporation
======================================
- Device #1: GeForce GTX 970, 1024/4096 MB allocatable, 13MCU

OpenCL Platform #2: Intel(R) Corporation
========================================
- Device #2: Intel(R) Core(TM) i3 CPU         550  @ 3.20GHz, skipped


Is the device numbering opposite, or does the command option do the opposite?

how to run hashcat legacy rules on new hashcat v3?

$
0
0
(This is related to my other question.)

In an attempt to run rules that I previously had to run on CPU hashcat legacy, in hashcat v3, I try:

hashcat64.exe  --opencl-device-types 1

Which gets:

OpenCL Platform #1: NVIDIA Corporation
======================================
- Device #1: GeForce GTX 970, skipped

OpenCL Platform #2: Intel(R) Corporation
========================================
- Device #2: Intel(R) Core(TM) i3 CPU         550  @ 3.20GHz, 4061/16247 MB allocatable, 4MCU

But the rules get this warning:

WARNING: Cannot convert rule for use on OpenCL device in file  testCPU.rule on line 1741: @a

So how do I run a rule like "@a"?

mask password without 3 or more recurring characters

$
0
0
Hello,

    is it possible to use mask, but exclude all passwords containing 3 or more same characters in row(case insensitive)?

Example of passwords to avoid (with marked repetition):

aaabcdefgh
qwertyyyyyy
zzyyrrrooee
qwEeE110

Example of passwords not to avoid:
qqwweerrttyy
12312312311211
aabababa


My idea is, that there's really low probability, that generated password will contain 3 or more same characters in row. Also there are (probably) no words containing 3 or more same characters in row. So we can dramatically lower the count of passwords we must check.

Thanks in advance!

postak

Incomplete hash -how to find out the password??

$
0
0
Hi,

I want to ask you, is it possible to find correct password if I have only part of hash?

My problem looks like - > the password is number between 0 and 16^16. The hashing algorithm is sha512.

But I don't have hash. I have only 16 chars (and their position in hash)

The thing which interesting me, is possibility to set somehow *any* char in hashlist file (for e.g ??d?? means any hash will have on third position 'd'). I thought that is will be easy, but I didn't see this kind of feature.

I was trying to use ? in hashlist, and it *sometimes* is working. I think that comparing is done by some binary operation (I can't find this place in code, but I didn't spend enought time with source code ;/)

Did somebody try to done something like this? Any idea how I can do that? Smile

Also, if hashcat didn't have support for something like that, I can try to create patch, but I need some help where I should start looking (the hashcat.c has something like 20k in C ;D )

Change the apply order of rules?

$
0
0
Is there a way to change the way rules are applied to the words? For example, assume I have the following files:

Code:
$ cat words
a
b
c
$ cat rules
$1
$2
$3

Gives me the candidates:
Code:
$ hashcat --stdout hash -r rules words
a1
a2
a3
b1
b2
b3
c1
c2
c3

Is there a way to change the logic so that the words would be applied to the rules, and not the way it is now? This is what I want:
Code:
a1
b1
c1
a2
b2
c2
a3
b3
c3

Or do I have to apply the rules individually, rerunning hashcat each time?

Resume is broken

$
0
0
(I remade this post so hopefully my old confusing one will be gone soon as I asked a admin to delete it.)

So I am using the latest version of Kali, which is all upto dateand runnin it Nividia Drivers.

I have my password file which is 1TB and .hccap file stored on an external USB 4TB drive

The command I use is hashcat -w 3 -m 2500 out.hccap.hccap  zyzyzyzy-abababab.txt

When I am in the external HD drives directory

/media/root/Zim

The hashcat command then starts and the command line returned is :

 Generating dictionary stats for zyzyzyzy-abababab.txt: 154010289600 bytes (14.92%), 17112254400 words,

Until it reaches 100% where It then starts cracking.


Session.Name...: hashcat
Status.........: Running
Input.Mode.....: File (zyzyzyzy-abababab.txt)
Hash.Target....: VM900358-2G (e8:fc:af:26:e7:18 <-> 60:fe:1e:20:1c:ab)
Hash.Type......: WPA/WPA2
Time.Started...: Fri Jul 15 15:13:48 2016 (2 mins, 33 secs)
Time.Estimated.: Thu Jul 28 00:35:02 2016 (12 days, 9 hours)
Speed.Dev.#1...: 107.1 kH/s (15.21ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 18743296/114661785600 (0.02%)
Rejected.......: 0/18743296 (0.00%)
Restore.Point..: 18743296/114661785600 (0.02%)

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

When I hit the C key it quits and saves the data.
I goto /root/.hascat and copy it, then saving it to an external folder on my external HD.
Then I type in hashcat --resume
and it goes back to cracking.


I always repeat the same procedure again and again, but sometimes it goes straight back to

Generating dictionary stats for zyzyzyzy-abababab.txt: 154010289600 bytes (14.92%), 17112254400 words,


From 0% even if I delete the .hascat folder and replace it with a backup that works.
Because it a 1GB file this can take hours and I dont think it resumes from where it left off.
It just leaves me back to cracking from 0% which is annoying as I need 6 days to crack my WPA key.

I have noticed since I un-installed hascat 2
and installed hashcat 3, where it was DL to my eternal drive.
Hashcat runs from a folder in usr/local/bin and not the file on my Hashcat-3.00 folder on my external drive.

So can any one help me please or will have to just split my password file down in to chunks that will take 8 hours for each one.

Thanks.

Mask-Problem for Noob.

$
0
0
Hi guys,

who can help me? I have an understanding problem. I know that a user creates his passwords by following schemes:


1-4 numbers (but not always)
1-12 letters (from time to time is the first letter a uppercase).
1-4 numbers (but not always)
1-2 special character (but not always)

There is a muster:

68alex!
5alehandro!!
37Aleks!!!
Alekss75!
alehhandro68!
1968aleksander1975
aleksander75.
Aleksandr1975
Aleksander1975!
alex1968.

Which mask can I create, to cover all there possible combinations of such passwords?

Code:
--increment-min=1 --increment-max=22 -1 ?d?u?l?d?s ?d?d?d?d?u?l?l?l?l?l?l?l?l?l?l?l?l?l?d?d?d?d?s?s
???

Although I have read the help, but my English is very bad.

Thanks.

Takeshi

Old format available?

$
0
0
I'm wondering if I can use this type : 3910 md5(md5($pass).md5($salt)) in hashcat?

md5(md5($pass).$salt) would work too...

if so, how? In hashcat 3.0 it doesnt seem to work...
Viewing all 8126 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>