Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8211 articles
Browse latest View live

Potfile format - to hex or not to hex

$
0
0
Are there any utilities to convert passwords in a pot file to all hex or all plaintext?

For example, if I have a potfile and it has mixed entries for found passwords and some look like $HEX[hexcharactershere], is there a way to convert those to their plain-text equivalent?

Related to that, would converting from hex to ascii be problematic if some CR/LF/NUL characters are present?
See here: https://hashcat.net/forum/thread-2483.html

Similarly, is there a way to convert all plaintext entries from a potfile to all $HEX[] format?

For hex to ascii conversion, this will do in a pinch (not tested):
From https://hashcat.net/forum/thread-3522.html
perl -ne 'if ($_ =~ m/\$HEX\[([A-Fa-f0-9]+)\]/) {print pack("H*", $1), "\n"}'

But what about ascii to hex?

I will probably write something if this doesn't exist.

hash(hash)

$
0
0
Hi fellow hashcats Smile

From time to time, I have the a complex hash function, like today - f(x)=SHA256(SHA256(x)) - a double SHA256 we could say, sometimes something more complicated.

My question is how do I set hashcat to help me in such case ? Can't see a dedicate mode for double SHA256.

type example.dict

$
0
0
Hello
I am newbie.

Explain please the difference, between the ways of dictionary brutforce:

This:
hashcat64.exe -m 400 example400.hash example.dict

and this:
type example.dict | hashcat64.exe -m 400 example400.hash

In the second example, the program runs in conjunction with MS-DOS command: "Type"

I can not understand the difference. In the attached pictures there is a slight difference, but still, please explain.

Thank you very much

.jpg   2017-03-15_21-12-58.jpg (Size: 376.58 KB / Downloads: 6)

Early 1080Ti benchmark

$
0
0
Here is a first sample for the Founders 1080Ti right off the truck from Nvidia pre-sales. Seeing some errors near the end, may be driver related not sure.

Code:
                                                    hashcat (v3.40) starting in benchmark mode...

* Device #1: WARNING! Kernel exec timeout is not disabled, it might cause you errors of code CL_OUT_OF_RESOURCES
            See the wiki on how to disable it: https://hashcat.net/wiki/doku.php?id=timeout_patch
nvmlDeviceSetPowerManagementLimit(): Insufficient Permissions

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1080 Ti, 2816/11264 MB allocatable, 28MCU

Hashtype: MD4

Speed.Dev.#1.....: 51671.3 MH/s (72.64ms)

Hashtype: MD5

Speed.Dev.#1.....: 30068.9 MH/s (62.41ms)

Hashtype: Half MD5

Speed.Dev.#1.....: 19908.7 MH/s (94.30ms)

Hashtype: SHA1

Speed.Dev.#1.....: 11091.9 MH/s (84.62ms)

Hashtype: SHA256

Speed.Dev.#1.....:  4389.0 MH/s (53.22ms)

Hashtype: SHA384

Speed.Dev.#1.....:  1412.3 MH/s (83.08ms)

Hashtype: SHA512

Speed.Dev.#1.....:  1462.1 MH/s (80.23ms)

Hashtype: SHA-3(Keccak)

Speed.Dev.#1.....:  1125.6 MH/s (52.04ms)

Hashtype: SipHash

Speed.Dev.#1.....: 38203.2 MH/s (98.29ms)

Hashtype: Skip32

Speed.Dev.#1.....:  5990.5 MH/s (5.53ms)

Hashtype: RipeMD160

Speed.Dev.#1.....:  6654.1 MH/s (70.52ms)

Hashtype: Whirlpool

Speed.Dev.#1.....:   356.1 MH/s (164.62ms)

Hashtype: GOST R 34.11-94

Speed.Dev.#1.....:   332.5 MH/s (88.21ms)

Hashtype: GOST R 34.11-2012 (Streebog) 256-bit

Speed.Dev.#1.....: 70462.5 kH/s (205.78ms)

Hashtype: GOST R 34.11-2012 (Streebog) 512-bit

Speed.Dev.#1.....: 70524.8 kH/s (205.57ms)

Hashtype: DES (PT = $salt, key = $pass)

Speed.Dev.#1.....: 22097.1 MH/s (84.88ms)

Hashtype: 3DES (PT = $salt, key = $pass)

Speed.Dev.#1.....:   671.6 MH/s (87.35ms)

Hashtype: phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla)

Speed.Dev.#1.....:  9341.1 kH/s (96.58ms)

Hashtype: scrypt

Speed.Dev.#1.....:   778.2 kH/s (17.98ms)

Hashtype: PBKDF2-HMAC-MD5

Speed.Dev.#1.....:  9804.9 kH/s (58.95ms)

Hashtype: PBKDF2-HMAC-SHA1

Speed.Dev.#1.....:  4330.2 kH/s (85.82ms)

Hashtype: PBKDF2-HMAC-SHA256

Speed.Dev.#1.....:  1678.3 kH/s (58.85ms)

Hashtype: PBKDF2-HMAC-SHA512

Speed.Dev.#1.....:   590.3 kH/s (88.45ms)

Hashtype: Skype

Speed.Dev.#1.....: 17496.2 MH/s (53.61ms)

Hashtype: WPA/WPA2

Speed.Dev.#1.....:   540.1 kH/s (52.82ms)

Hashtype: IKE-PSK MD5

Speed.Dev.#1.....:  2530.5 MH/s (92.36ms)

Hashtype: IKE-PSK SHA1

Speed.Dev.#1.....:   979.3 MH/s (59.81ms)

Hashtype: NetNTLMv1-VANILLA / NetNTLMv1+ESS

Speed.Dev.#1.....: 29973.5 MH/s (62.61ms)

Hashtype: NetNTLMv2

Speed.Dev.#1.....:  2353.6 MH/s (49.82ms)

Hashtype: IPMI2 RAKP HMAC-SHA1

Speed.Dev.#1.....:  2235.6 MH/s (52.45ms)

Hashtype: Kerberos 5 AS-REQ Pre-Auth etype 23

Speed.Dev.#1.....:   388.1 MH/s (75.57ms)

Hashtype: Kerberos 5 TGS-REP etype 23

Speed.Dev.#1.....:   404.9 MH/s (72.44ms)

Hashtype: DNSSEC (NSEC3)

Speed.Dev.#1.....:  4598.1 MH/s (50.80ms)

Hashtype: PostgreSQL Challenge-Response Authentication (MD5)

Speed.Dev.#1.....:  9168.5 MH/s (51.15ms)

Hashtype: MySQL Challenge-Response Authentication (SHA1)

Speed.Dev.#1.....:  3138.1 MH/s (74.46ms)

Hashtype: SIP digest authentication (MD5)

Speed.Dev.#1.....:  4862.7 MH/s (96.15ms)

Hashtype: SMF > v1.1

Speed.Dev.#1.....:  9273.2 MH/s (50.59ms)

Hashtype: vBulletin < v3.8.5

Speed.Dev.#1.....:  9503.7 MH/s (49.34ms)

Hashtype: vBulletin > v3.8.5

Speed.Dev.#1.....:  6445.9 MH/s (72.80ms)

Hashtype: IPB2+, MyBB1.2+

Speed.Dev.#1.....:  6722.9 MH/s (69.80ms)

Hashtype: WBB3, Woltlab Burning Board 3

Speed.Dev.#1.....:  1738.3 MH/s (67.48ms)

Hashtype: OpenCart

Speed.Dev.#1.....:  2688.9 MH/s (86.93ms)

Hashtype: Joomla < 2.5.18

Speed.Dev.#1.....: 29497.2 MH/s (63.60ms)

Hashtype: PHPS

Speed.Dev.#1.....:  9308.5 MH/s (50.39ms)

Hashtype: Drupal7

Speed.Dev.#1.....:    76871 H/s (92.97ms)

Hashtype: osCommerce, xt:Commerce

Speed.Dev.#1.....: 17562.4 MH/s (53.40ms)

Hashtype: PrestaShop

Speed.Dev.#1.....: 11292.5 MH/s (83.12ms)

Hashtype: Django (SHA-1)

Speed.Dev.#1.....:  9163.4 MH/s (51.18ms)

Hashtype: Django (PBKDF2-SHA256)

Speed.Dev.#1.....:    83893 H/s (69.75ms)

Hashtype: Mediawiki B type

Speed.Dev.#1.....:  8673.2 MH/s (54.09ms)

Hashtype: Redmine Project Management Web App

Speed.Dev.#1.....:  3781.9 MH/s (61.78ms)

Hashtype: PunBB

Speed.Dev.#1.....:  3730.3 MH/s (62.65ms)

Hashtype: PostgreSQL

Speed.Dev.#1.....: 29374.7 MH/s (63.90ms)

Hashtype: MSSQL(2000)

Speed.Dev.#1.....: 11453.0 MH/s (81.95ms)

Hashtype: MSSQL(2005)

Speed.Dev.#1.....: 11404.5 MH/s (82.30ms)

Hashtype: MSSQL(2012)

Speed.Dev.#1.....:  1395.0 MH/s (84.10ms)

Hashtype: MySQL323

Speed.Dev.#1.....: 65269.2 MH/s (57.51ms)

Hashtype: MySQL4.1/MySQL5

Speed.Dev.#1.....:  5120.9 MH/s (91.30ms)

Hashtype: Oracle H: Type (Oracle 7+)

Speed.Dev.#1.....:  1317.9 MH/s (88.97ms)

Hashtype: Oracle S: Type (Oracle 11+)

Speed.Dev.#1.....: 11010.2 MH/s (85.24ms)

Hashtype: Oracle T: Type (Oracle 12+)

Speed.Dev.#1.....:   145.4 kH/s (98.25ms)

Hashtype: Sybase ASE

Speed.Dev.#1.....:   363.2 MH/s (80.75ms)

Hashtype: EPiServer 6.x < v4

Speed.Dev.#1.....:  9263.5 MH/s (50.63ms)

Hashtype: EPiServer 6.x > v4

Speed.Dev.#1.....:  3820.8 MH/s (61.15ms)

Hashtype: md5apr1, MD5(APR), Apache MD5

Speed.Dev.#1.....: 13997.7 kH/s (63.98ms)

Hashtype: ColdFusion 10+

Speed.Dev.#1.....:  2465.4 MH/s (95.18ms)

Hashtype: hMailServer

Speed.Dev.#1.....:  3826.0 MH/s (61.07ms)

Hashtype: SHA-1(Base64), nsldap, Netscape LDAP SHA

Speed.Dev.#1.....: 11012.4 MH/s (85.23ms)

Hashtype: SSHA-1(Base64), nsldaps, Netscape LDAP SSHA

Speed.Dev.#1.....: 11016.4 MH/s (85.19ms)

Hashtype: SSHA-256(Base64), LDAP {SSHA256}

Speed.Dev.#1.....:  4305.7 MH/s (54.25ms)

Hashtype: SSHA-512(Base64), LDAP {SSHA512}

Speed.Dev.#1.....:  1451.4 MH/s (80.81ms)

Hashtype: LM

Speed.Dev.#1.....: 21699.5 MH/s (86.40ms)

Hashtype: NTLM

Speed.Dev.#1.....: 51018.8 MH/s (73.58ms)

Hashtype: Domain Cached Credentials (DCC), MS Cache

Speed.Dev.#1.....: 14910.4 MH/s (62.93ms)

Hashtype: Domain Cached Credentials 2 (DCC2), MS Cache 2

Speed.Dev.#1.....:   440.8 kH/s (50.85ms)

Hashtype: MS-AzureSync PBKDF2-HMAC-SHA256

Speed.Dev.#1.....: 13415.7 kH/s (51.86ms)

Hashtype: descrypt, DES(Unix), Traditional DES

Speed.Dev.#1.....:  1280.1 MH/s (91.59ms)

Hashtype: BSDiCrypt, Extended DES

Speed.Dev.#1.....:  2132.9 kH/s (71.03ms)

Hashtype: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5

Speed.Dev.#1.....: 14044.6 kH/s (63.75ms)

Hashtype: bcrypt, Blowfish(OpenBSD)

Speed.Dev.#1.....:    20280 H/s (43.00ms)

Hashtype: sha256crypt, SHA256(Unix)

Speed.Dev.#1.....:   521.4 kH/s (87.09ms)

Hashtype: sha512crypt, SHA512(Unix)

Speed.Dev.#1.....:   203.4 kH/s (56.81ms)

Hashtype: OSX v10.4, v10.5, v10.6

Speed.Dev.#1.....:  9082.6 MH/s (51.64ms)

Hashtype: OSX v10.7

Speed.Dev.#1.....:  1286.9 MH/s (91.16ms)

Hashtype: OSX v10.8+

Speed.Dev.#1.....:    16905 H/s (98.72ms)

Hashtype: AIX {smd5}

Speed.Dev.#1.....: 13998.9 kH/s (63.99ms)

Hashtype: AIX {ssha1}

Speed.Dev.#1.....: 59149.7 kH/s (52.41ms)

Hashtype: AIX {ssha256}

Speed.Dev.#1.....: 23010.1 kH/s (73.43ms)

Hashtype: AIX {ssha512}

Speed.Dev.#1.....:  8994.5 kH/s (95.32ms)

Hashtype: Cisco-PIX MD5

Speed.Dev.#1.....: 21931.2 MH/s (85.60ms)

Hashtype: Cisco-ASA MD5

Speed.Dev.#1.....: 22103.3 MH/s (84.93ms)

Hashtype: Cisco-IOS SHA256

Speed.Dev.#1.....:  4211.8 MH/s (55.47ms)

Hashtype: Cisco $8$

Speed.Dev.#1.....:    83783 H/s (69.84ms)

Hashtype: Cisco $9$

Speed.Dev.#1.....:    22866 H/s (626.46ms)

Hashtype: Juniper Netscreen/SSG (ScreenOS)

Speed.Dev.#1.....: 17261.0 MH/s (54.35ms)

Hashtype: Juniper IVE

Speed.Dev.#1.....: 13968.7 kH/s (64.13ms)

Hashtype: Android PIN

Speed.Dev.#1.....:  7341.0 kH/s (61.61ms)

Hashtype: Citrix NetScaler

Speed.Dev.#1.....:  9916.4 MH/s (94.65ms)

Hashtype: RACF

Speed.Dev.#1.....:  3464.8 MH/s (67.71ms)

Hashtype: GRUB 2

Speed.Dev.#1.....:    58981 H/s (99.20ms)

Hashtype: Radmin2

Speed.Dev.#1.....: 10874.4 MH/s (86.32ms)

Hashtype: SAP CODVN B (BCODE)

Speed.Dev.#1.....:  2319.3 MH/s (50.55ms)

Hashtype: SAP CODVN F/G (PASSCODE)

Speed.Dev.#1.....:  1304.0 MH/s (89.98ms)

Hashtype: SAP CODVN H (PWDSALTEDHASH) iSSHA-1

Speed.Dev.#1.....:  8098.3 kH/s (55.69ms)

Hashtype: Lotus Notes/Domino 5

Speed.Dev.#1.....:   297.0 MH/s (98.79ms)

Hashtype: Lotus Notes/Domino 6

Speed.Dev.#1.....:   100.1 MH/s (73.27ms)

Hashtype: Lotus Notes/Domino 8

Speed.Dev.#1.....:   884.4 kH/s (51.29ms)

Hashtype: PeopleSoft

Speed.Dev.#1.....: 11398.4 MH/s (82.33ms)

Hashtype: PeopleSoft PS_TOKEN

Speed.Dev.#1.....:  4422.2 MH/s (52.82ms)

Hashtype: 7-Zip

Speed.Dev.#1.....:    12925 H/s (69.00ms)

Hashtype: WinZip

Speed.Dev.#1.....:  1437.6 kH/s (68.18ms)

Hashtype: RAR3-hp

Speed.Dev.#1.....:    44051 H/s (81.18ms)

Hashtype: RAR5

Speed.Dev.#1.....:    50925 H/s (70.06ms)

Hashtype: AxCrypt

Speed.Dev.#1.....:   161.6 kH/s (144.57ms)

Hashtype: AxCrypt in memory SHA1

Speed.Dev.#1.....: 10490.9 MH/s (89.47ms)

Hashtype: TrueCrypt PBKDF2-HMAC-RipeMD160 + XTS 512 bit

Speed.Dev.#1.....:   366.7 kH/s (73.55ms)

Hashtype: TrueCrypt PBKDF2-HMAC-SHA512 + XTS 512 bit

clWaitForEvents(): CL_UNKNOWN_ERROR

Speed.Dev.#1.....:        0 H/s (0.00ms)

Hashtype: TrueCrypt PBKDF2-HMAC-Whirlpool + XTS 512 bit

clCreateContext(): CL_UNKNOWN_ERROR

Started: Wed Mar 15 14:44:35 2017
Stopped: Wed Mar 15 14:51:58 2017

TL;DR:

Hashtype: WPA/WPA2
Speed.Dev.#1.....: 540.1 kH/s (52.82ms)

Hashtype: MD5
Speed.Dev.#1.....: 30068.9 MH/s (62.41ms)

Gpu renting?

$
0
0
Just an idea, not a developer, or have the slitest know how on developing an applications or if this is allowed, but it would be cool to see a server that you can add clusters of gpus too over the internet like Bitcoin mining where you can buy gpu power for cracking a "file" or you could use the service to sell gpu power like Bitcoin mining and have the server owner take a % of the income

Budget cracking machine

$
0
0
Hi guys I'm interested in you opinions what about I'm going to say
I would like to say first that this kind of project is a hobby thing so i would never ever spend thousand of dollars on it.

I wanted to build a low budget cracking machine and here is what I put up in theory.


I searched for second hand pc parts and here is what I've got:

MSI K9ND Speedster2 (MS-9661) ATX motherboard with 2 PCI-e x16 slots and 1 x8 slot

2 AMD Opteron 2352(8x2,1gh) or 2 AMD Opteron 2354 (8x2,2gh)

16gb ddr2 memory

400W Seasonic SS400H1U PSU

Raid card: Areca ARC 1120/1220 256mb 4 port SATA RAID

A bunch of cable for this.

2 fans

this is so far 76 usd or with the better cpus 86 usd

And for the last part the gpu

Radeon 5970 for 69 usd

so the hole config is 145 usd and it can be expended with an other 5970 to reach insane speed for this price.
I'm highlighting that the hole rig is build by used components and I already have an HDD.

So what do you guys think about it? Is it a waste of money? Or a brilliant idea?

zlib on GPU

$
0
0
Hello!
I'm interested in the question, is it possible to rewrite the zlib library on the GPU?
(Only the Inflate method is interested)
Or maybe I should not even try?

NTLM list with Duplicate Hashes

$
0
0
Hello,

I have cracked a list of NTLM hashes and noticed the following...

For example:

User1:123456789
User2:987654321
User3:123456789


It appears that when I run hashcat, user1 will show up on my output file but not user3 even though they have the same hash.

My command basically was this:

hashcat -a 0 -m 1000 -r rulefile.rule --potfile-path potfile.pot -o cracked.txt --username hashfile.out rockyou.txt

then

hashcat --show -m 1000 --outfile-format 2 --potfile-path potfile.pot -o cleancracked.txt --username hashfile.out

Is there a command that I am missing to crack duplicates instead of only cracking the first one in the list? 

I will continue to research on my own but would love to hear any thoughts or advice.

Thank you!
N0ur5

Is my computer good

$
0
0
Hello I'm Turkish user :Smile and I know very little English

Intel(R) Core(TM) i7-6500U CPU @ 2.5GHz 
16 GB RAM

AMD Radeon R5 M335 / Intel(R) Graphics 520

Thank you

guess number

$
0
0
Hello,

I'm trying to use hashcat to crash a bunch of md5 hashes.  I'm using it in brute force mode.  When hashcat cracks a hash, it displays the <hash>:<password>.  Is there a switch that will cause hashcat to also display the number of guesses or passwords it tried before it succeeded?

TIA

cap2hccapx and odd ESSID

$
0
0
Hi,

I would like to modify cap2hccapx.c (and push it to github if needed) to print ESSID in hexadecimal.
Why ? To display/manipulate odd characters in the ESSID string e.g. russian, accent, etc

Or the question could be : how to give an odd ESSID string as a parameter to cap2hccapx ?

What's the best way to achieve this ? Is hexadecimal the good answer ?

Thank you.

Oracle o5logon hash bruteforce

$
0
0
Hi, everybody!
Please help me solve something misunderstood about Oracle hash.
You most knowing that the Oracle O5Logon protocol contains the
vulnerability that allows for the password to be cracked offline
by bruteforcing the session key.
With help nmap and some script oracle-brute-stealth i have got out
session keys and salts for SYS user.

--------------------------------
This format of ouput file:

sys:$o5logon$hex digits of 96 (0x60) in length*hex digits of 20 (0x14) in length (salt)
sys:$o5logon$another hex digits of 96 (0x60) in length*hex digits of 20 (0x14) in length (salt)

...
ten times
---------------------------------

I have The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux with Hashcat intagrated package, but it doesn't
understand this kind of hash and reject with error line length exception.
I think that shall convert it to hashcat format from john the ripper, but can't find any script or info about it.
(sorry for my bad english)
With best regards and hope, machgun.

Very slow Hash

$
0
0
Apologies for the noob questions, I'm using HashcatGUI with hascat3.4 to crack two Office 2013 Hash. I've already extracted the hash using office2john.
I have an intel 4790k and an AMD Radeon R9 Nano.
But I'm only getting 3931H/s.
This seems very low?
I have an issue where it says my CPU isn't OpenCL native, I've tried updating windows drivers and downloaded OpenCL separately. Same error even after restarting computer. So I used --force to ignore warnings, yes the warnings no longer appear but the hash is still slow.
Can anyone give me any advice?
Thanks in advance

Potfile.

$
0
0
At the moment I'm running various mask-attacks based on previous passwords found. So once my first attack has finished, I try another - but each time I have to wait a few minutes whilst Hashcat searches potfile.

Is there a way to keep writing the Hashes to potfile once found, but disable searching before each attack.

I understand that I can do: "--potfile disable" but that will disable my founds going to potfile, right?

Thanks.

Parsing out hashes from single lines

$
0
0
Scenario: a sql dump file that contains multiple md5 hashes, but they are all on a single line.  The goal is to parse them out to make them readable by hashcat.

While this command is functional, it runs VERY slow.

cat md5.sql | grep -i -o -w '\w\{32\}' | grep -i -v '[g-z_]' > md5_hashes_unsorted_ununiqed.hash

Is there a faster way to parse out md5 strings from single lines that contain multiple md5 hashes?

Upgrading Ubuntu 14 to 16

$
0
0
Has anyone run 'do-release-upgrade' on their Ubuntu 14 installation in order to upgrade it to Ubuntu 16.04.2 LTS?

I have been avoiding doing this since everything is working well with Ubuntu 14 and it is supported until 2019.  But I know that I will have to upgrade eventually.

Has the upgrade process gone smoothly or have there been any issues?

Did ssh still work afterwards?
Did the config for xdm stay intact?
Were there any driver problems, Nivida or AMD?

+55 minutes in Generating Dictionary for 194GB

$
0
0
Hi all,
I'm a newbie (so excuse for any mistake I can generate) :-)

I need to recover my ethereum wallet password. I remember the password structure, the words and the combinations but not the way I used all togheter; so I created a 194GB dictionary and turned on a AWS machine with tesla K80.

Installed cudaHash on Amazon Linux and nVidia is OK and any test is ok...or at least it seems to be to my eyes; then I benchmarked cudaHashcat64.bin and it is ok.

Now I used

./cudaHashcat64.bin -m 5000 -a 0 wallet.hash /dictionary/verybigwordlist.txt

I'm pretty sure I have made everything correct but I was not able to understand why I'm waiting (now) 55 minutes for "Generating dictionary stats for /dictionary/verybigwordlist.txt: 20537007704 bytes (1.00%), 347517734 words, 347517730 keyspace".

I'd like to know if I did something wrong or everything is ok: just this !
Also ff some one has documentation that explain this, please point to me so I can understand by my own.
Thanks !!

Combination attack and rules how?

$
0
0
I want to use the combination attack and rules together 
for instance my password is "Helloworld123"
left dictionary has "hello"
right dictionary has "world"
so using combination i will get "helloworld"
i can add any digit or symbol to the left or right rule but i want to test all 3 digits possibility from 000-999 and capital letter
how can i achieve it
thanx

Extra cooling for the Corsair 730T (easy case mod)

$
0
0
Since I prefer air cooling (who has time to be a plumber in addition to being a hashcat enthusiast?), I have come up with a simple case mod for the Corsair 730T (the 730T costs about $140 lately).  I originally bought this case for a build back in 2014 and I have always noticed the grill on the side door.

http://www.corsair.com/en-us/graphite-se...tower-case

I recently upgraded the fans in the case to the latest Maglev offerings from Corsair, various flavors of their ML120's and ML140's.  I had some extra ML120's due to ordering the wrong size, but I decided to keep them.  

This is the result of what you do when you have a Corsair 730T, an extra ML120, and some left over zip ties.  Using zip ties made seemed to be the best option since it is only plastic up against the metal door and they are flexible.  Traditional mounting hardware, like 6-32 screws and nuts, wouldn't have worked anyway since this area of the door was never made to have fans mounted to it.

This is what it looks like from outside the case.  You can also see the ML140 fan as the main rear case fan.

[Image: 20170319_175416_zpsqn3jcvnq.jpg]

Here, you can see inside the door that opens.  It is barely visible, but you can also see the wire that runs from the fan to the bottom of the motherboard, where a fan header is.  Right now, there is only a single GPU, but more are coming.  The only water cooled component in the build is the CPU, which probably isn't necessary since I don't overclock anyway.  The GPU is a GTX 1080 FE running at factory clocks.  Under load, with the door closed, and with the GPU running its fan at 90 percent, it is only reaching 53 C (a very acceptable temperature).

[Image: 20170319_175457_zpsjmcsxiug.jpg]

This is a closeup of the ML120 fan with the zip ties.
[Image: 20170319_175532_zpsjbmuwjro.jpg]

I will probably be buying another one of these cases just so I can do this mod.  If anyone has any similar mods that they are willing to share, then I would very much like to see them.

Happy hashcatting! Smile

defect in outfile_write method.

$
0
0
When using --outfile-format=11, hashcat is suppose to include the guess number as the last item.  However, this was the output:

a2593e6a5ae8ba54b95ff7b182d738a8:jblaze:

Looking at outfile_write, I tracked down the problem.  Variable 'tmp_len' needs to be increased in size to accommodate the crackpos text.  Here is my rudimentary fix on line 439:

435:  if (outfile_ctx->outfile_format & OUTFILE_FMT_CRACKPOS)
436:  {
437:    sprintf (tmp_buf + tmp_len, "%" PRIu64, crackpos);
438:  }
439:  tmp_len += 20; // Need to move end of the buffer to include crackpos.
440:  tmp_buf[tmp_len] = 0;

After adding line 439, the output is now:
a2593e6a5ae8ba54b95ff7b182d738a8:jblaze:9612916440

I'm using version 3.40 of hashcat.  Please let me know if this is the right place to post such things.
Viewing all 8211 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>