Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8191 articles
Browse latest View live

Ethereum Mining Cards for HashCat

$
0
0
Does anyone have benchmarks for the gpus for mining (P106-100)? I am curious how they stack up to the current cards. Or even if you have some guess as to how the performance might be impacted that would be cool.

Thanks,
Kaz

Syntax help

$
0
0
Hi guys.. I am trying to brute force crack a WPA password.. but i am having difficulty with some syntax
The combination of the password is

WIFIpass_XXXXX 
X is charset abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789


is this possible?

crack excel password with hashcat, possible?

$
0
0
There is an old worksheet with a password on it. Now, I can't remember the password and forgot to write it down. Is it possible to crack the password with Hashcat? If yes, how to do that?

SHA512 without salt

$
0
0
I've got a group of hashes that appear to be SHA512 (start with $6, have the number of rounds listed in the $rounds=5000 format) but don't have a salt. -m 1800 doesn't work and I've tried to tweak the hashes a few different ways but so far no luck so I figured I'd check with the community.

Redacted Example:  $6$rounds=50$XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

Thanks,

Matt

Capturing a Win-rar hash!

$
0
0
How can I extract or capture a Win-rar/7zip hash from it's archive file?.I searched the whole Internet but found no useful information!Plz help me out!

How HASHCAT changed everything!!!

$
0
0
I just got low grades in my exam,and my parents locked up my computer.Am I supposed to watch some dumb TV shows,the whole vacation?.So I searched the whole internet ,how I could crack my windows password,but nothing was working,even Ophcrack was useless.So as a last resort,as a last beacon of hope-I came to know of Hashcat.I went to a cafe,downloaded a live cd of Linux and copied the SAM files from my computer,I wasn't still sure whether Hashcat could open up my doors,but hell,it worked!!!.With the help of my friends' GPU,Hashcat cracked the 15 char long NTLM password in an hour,and that made my vacation a damn lot better.Thank you,Hashcat,I always will be indebted towards you!!!!!,

Hashcat Bruteforce attack startpoint

$
0
0
Hello everybody. Can you please help me out?

I have this problem:

My task requires splitting one large task to number of smaller once. 
Each task must have a start point, for example something like:

[#1] start: 00000000000001, finish: 10000000000000
[#2] start: 10000000000001, finish: 20000000000000
[#3] start: 20000000000001, finish: 30000000000000
and so on... * (actually i have letters, but numbers more representative)

Can i somehow set start and finish point when i start hashcat (maybe as a direct "word" or kind of increment number) without generating huge and useless wordlist?

Thank you!

HC do not recognize pass

$
0
0
Hello. I have a some problem.
I'm testing recovering WPA/WPA2 password from handshake. I converted *.cap to *.hccapx for HC (using converter on HC site), for test I created wordlist, that contain 2 passwords, one of it is right. When i start HC, it work, but do not recognize right password, it just ending without result. But aircrack-ng with non-converted *.cap and same wordlist successfully find pass.
http://cdn1.savepice.ru/uploads/2017/7/2...2-full.png
I can't understand where is my(?) mistake, please help

OS: Windows 7 x64
HC v. latest 3.6.0
Using commands
HC: D:\words\handshakes\hashcat-3.6.0\hashcat64.exe --force -m 2500 D:\words\handshakes\hashcat-3.6.0\1836_1499014883.hccapx D:\words\handshakes\hashcat-3.6.0\1.txt
aircrack-ng: C:\Users\duck\Desktop\aircrack-ng-1.2-rc4-win\bin\64bit\aircrack-ng-avx -w D:\words\1.txt D:\words\handshakes\test_serv.cap

Problems with prince processor

$
0
0
Is there no prince processor for 32-bit windows?Plz give me a link if there is!

markprocessor question password custom charset

$
0
0
Hi,
I have password to decrypt example:

(1)(2)(3)(4)(5)sada(6)(7)

(1) - group of letters: d,s,a
(2) - group of special letters: ",$,^
(3) - group of word: asdas,asdasda,asdfew,
etc.

and there is more than maskprocessor can handle more then 4 custom charset

how i can pass this someone know a bash script for that?

script should take only one letter from each group and try all combination

i need output like txt file with all combination, please help me i forget my password for encrypted disk with all my data Tongue


Best regards!

markprocessor question

$
0
0
Hi,

mp64 -1 01 ?1?1?1?1?1?1?1?1 -o posibilities.txt

how to make all possibilities but only with 4x 1 and 4x 0 no more in results?

i dont want   11111111 = 8x1
or                 00000000 = 8x0
or 11111000 = 6x1 2x0

i want          11110000 = 4x1 4x0
or                00110011 = 4x1 4x0

markprocessor question error

$
0
0
Hi,

I found error in markprocessor i cant create password for character like "!" or "#" its make trouble in command line

mp64 -1 abc #?1 -o test
mp64 -1 abc !?1 -o test

Mask processor

$
0
0
The -r parameter in the mask processor determines the no. of repetitions  r8t?But if I give the following cmd:


 mp32 -r 3 -1 abc ?1?1?1

It is not returning chars like aaa,bbb,ccc e.t.c,why is that?A char should repeat 3 times by the definition but it's not.


Also plz give me the difference b/w -q and -r parameter in mp with eg:

Mask processor error

$
0
0
Hey guys,I'm getting a weird problem with Hashcat.I've given the following command:

mp32 -q 4 ?u?u?u?u?u?u?u?u?u?u?u9951 | hashcat32 -a 3 -m 1000 ntlm. txt

Then Hashcat is launched but it's saying:"workload is too low and hashcat cannot use full parallel power of your GPU......"

then it displays approaching final keyspace and then cracking terminates normally but with no hashes recovered,what is causing this?

Why is it displaying workload is too low even though I've given a mask consisting of 15 characters?
Also guess mask in Hashcat window is only showing a mask of 6 characters,plz somebody find me a solution for this,brute forcing without mask processor is working fine and cracks the hash with the above mask but I need to use the -q parameter in mp.The same happens in both hashcat 3.50&3.60 versions.plz,I'm in urgent need!!!!

Office 2016?

$
0
0
I am in the process of putting together a small 'cluster' (currently leaning towards hashtopussy for job management with 20 GPUs) and was wondering if i am missing something here - does hashcat handle hashes from Office 2016 files? I assumed the answer was yes but i can't find anything confirming that - hopefully someone can chime in with thoughts..

Reward - Crack This Hash

$
0
0
$250 reward for cracking this hash.  Payable via PayPal, BTC, LTC, ETH.

$bitcoin$96$27d3a691605c87ecd52bba0ecee08b7e269b13d7ae95934c093e1cdb989b7614c2ae438a24aa4c47c9c82bef4cbee326$16$baa671840d90e9c3$153451$96$c87b9baef8691eba095b5cb54dfb6105c979505889f81ac9586e70c258aff90f9a66bbaf4aad977c326c02da26e9b741$66$03fe10fe906d26a252851445689ef9372a4a1ffaf2f5b15ee96ad20f789e0ffe32



If interested message with any questions.

Luks Encrypted Disk

$
0
0
Hello everyone,
I have a disk that it is in VHD and there are 2 partitions inside that.
the 2nd partition is Luks encrypted,
i saw in some commands that from windows to use something like " dd /dev/sdaxx.
my question is 
1) is there any command inside hashcat to show the disks i have on my computer?
2) how to use with hashcat and take the first 2mb of the luks encrypted disk so i can crack it more easy?
3) how i am using hashcat with the command /dev/sda... to guide that to the encrypted from luks disk? i repeat there is VHD disk.

Merge wordlists

$
0
0
Hi,I want to combine more than two wordlists in the combinator function of Hashcat,is there a way I can do this?If no,then plz suggest me some other ways through which I could combine/merge more than two wordlists together and then use them for cracking.

How can I crack a veracrypt encrypted partition?

$
0
0
Hi everyone,
in the last 2 days i tried to figure out, how to crack my encrypted partition. My 1st problem is: how do I get the hash of the password used for the encryption? If I'm right, the hash of the password is the basic to crack it. I'm using Win 8.1. The partition is encrypted with AES+SHA512.
I looked in several other posts, but every post I found to encrypted partitions, was closed or not online anymore.
Thanks!

H/s clarification

$
0
0
This may just be a matter of semantics, but I could use the information for a research project I'm working on using hashcat. 

The way I understand it, a very simplified view of password cracking can be summed up as follows: 

1. Acquire the hash of the target password
2. Take a candidate "plaintext" password and hash it with the same algorithm used for the target hash
3. Compare the generated hash with the targeted hash
4. Repeat until the generated and targeted hash match

The majority of cracking speed benchmarks (including hashcat's "speed" output) that I have run across are displayed in the unit H/s, which stands for hashes per second. At least to me, this seems to translate to the number of hashes generated per second. If this is the case, the time required for comparison (step 3) will technically be unaccounted for if the H/s benchmark is used to back-calculate the time required to crack a password.

Is the comparison step actually ignored, or does H/s incorporate it (i.e. hashes generated and compared per second)? I would assume that the time required for comparison is much smaller than the time required for generating hashes and may not really matter in the end, but it would be nice to know.

I have spent some time searching for this answer, but if I've missed it somewhere, I apologize-just please point me in the right direction x) Any help is appreciated. Thanks!
Viewing all 8191 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>