Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8095 articles
Browse latest View live

RAR crack

$
0
0
Hello,

I'm trying to crack a .rar with hashcat. I extracted the hash with rar2john and deleted the extra characters (possible error location since I guessed).

rar2john provided lines like this:
filename.rar:$RAR3$*0*HASHLIKETEXT1*HASHLIKETEXT2:0::::filename.rar

and I changed to this:

$RAR3$*0*HASHLIKETEXT1*HASHLIKETEXT2

If I start hashcat with -a 3 -m 13000 it complains about the line length.
If I start hashcat with -a 3 -m 12500 it writes about kernel and device initialization, then the OS crashes.

I'm on Win7, tried 3.5.0 and 3.6.0. The NVIdia driver is up-to-date.

If I try to crack an MD5 or WPA it runs smoothly, only RAR cracking has problems.

Could you please help me to decide if the edited hash format causes the crashing or something else?

Thanks,
PMTU

Ps: according to the HashCat wiki, the format of hash is fine.

2x1080 Ti vs 3x1080

$
0
0
Hi folks, considering to build mini crack station. Budget is max.  1500€. So, what to buy, 2x gtx 1080ti or 3x1080? Price of both would be almost the same, benchmarks seem also to be almost equal, ur suggestions? Lets assume, single gtx 1080ti costs 700€, and one gtx1080 500€.
thanks

help nvidia

$
0
0
Please can someone help me? I have the hashcatgui (interface) windows 7.64bits to run with my old nvidia card (8400GS)
When I start the drive I get the following error: this device local size is too small, no devices found / left - I already did everything, I installed nvidia drivers successfully 342.01 but it did not work.


[Image: 2dt62w0.png]

I also tried in linux inside a virtual machine (vbox) with parrot installed nvidia-opencl-icd and opencl-headers but it also did not work using the command line hashcat -m 2500 word.txt file.hccapx

[Image: 2namq1k.png]
[Image: 9]

Consult on server configuration for password cracking. Thank you all!

$
0
0
I have many 2007 versions of EXCEL documents that need to be cracked, so I'm planning to configure a password cracking server. Would you like to know if the following server configuration is reasonable? Do you have any better configuration suggestions? Thank you all!
cpu:Xeon e5-2665 X 2
Memory: recc ddr3 1600 32G
Graphics:nvidia 1080TI x4
Hard disk:SSD 250G

'Budget' rackmount/server rig questions

$
0
0
Hi,

I'm new to the forums, so go easy on me! I'm a big fan of Hashcat and I am looking at taking things to the next level.


I am currently looking to build a password cracking rig that can be used as a demo/training/R&D machine, which means that my requirements are enterprise/business level: 24/7 uptime; multiple users queuing jobs on the server; headless; rackmount available as an option (but can be freestanding for this first demo unit); must play nicely in a server rack with other machines.

Budget is approx £5000 (~$6500), I will be installing all components myself so labour is not a problem.

Currently basing my shopping off of this: http://www.netmux.com/blog/how-to-build-...acking-rig

Looking at 4 x GTX 1070 FE for budget purposes. As this is a demo unit, subsequent builds could use more powerful hardware (1080 etc.) so ideally case/mobo should support this. I can currently source the 1070s at £400 each.

May also be able to fit additional GPUs down the line to increase performance, so would appreciate suggestions for 6-8 GPU cases too.

If I have 4 x GTX 1070 8GB, so 32GB VRAM total, how much RAM do I need? I saw a post saying double your VRAM is a good rule of thumb.

Also, how frugal can I be with the CPU? My use of manipulating wordlists and using rules is fairly limited, but is something I need to start looking at due to the slow speeds of some of the hashes I am cracking. Do I need 2 x Intel Xeon E5-2620 2.4 GHz or can I make do with less? 2 x 1.7GHz Xeon instead?

Apologies if this is all a bit vague, it's early days for this project for me but thought I'd get advice from the experts first! I'm happy to provide some more info about my requirements if necessary!

Thanks Smile

Promblems for crack Office2013

$
0
0
The latest version does not find passwords for MsOffice 2013 on AMD Radeon 7970!
Version 3.10 works correctly on the same computer.
The latest drivers for AMD 7970

I put screenshots and hashes...

Hashcat64.exe -m9600 -a 0 --remove office2013.hash office.dic


$office$*2013*100000*256*16*9C0D1C43575992F70F1BD063F3A2D294*4CE783C9873CB64FF92FDF77805E5DA5*84CC00D24C143EDFF2CEC57BFFA69A64FD49BC122143A25DFFEFBD832179E7D5
$office$*2013*100000*256*16*9C0D1C43575992F70F1BD063F3A2D294*4D22E8641291421C7A6328FCFF35DB35*119198292A6DA2DBFB9401E7DFC8E254F31F8EDB0EE340CBA087A623D93B075A
$office$*2013*100000*256*16*C1823522E13E23A07DF5BB1B03827BCD*89BC7FC66E9EE2E4827179744931F666*265B871BE89FE8F1F4CF4EE634E12644BEE63E1004D4A4529A00A66E415670F9

.png   hashcat360.png (Size: 49.78 KB / Downloads: 1)

.png   hashcat310.png (Size: 40.61 KB / Downloads: 1)

.png   hg7970.png (Size: 75.98 KB / Downloads: 2)

session restore error

$
0
0
I tried this command to session restore:
hashcat -D 1 --force --session=md5 -m 0 -a 0 0 /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule

>>checkpoint

than I tried to restore:
hashcat -D 1 --force --restore --session=md5 -m 0 -a 0 0 /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule


output:
Usage: hashcat [options]... hash|hashfile|hccapxfile [dictionary|mask|directory]...

Try --help for more help.

Restore function doesn't work.
So could you help me, please?
An older version restore function worked well...


command: hashcat -V
pull/1273/head
Thanks,

980Ti and 780Ti run together

$
0
0
Hi.
Can I run 980Ti and 780Ti together with latest hashcat? 

Thanks.

Free WPA cracks online while in BETA

Checkpoint not working in latest version or me being a noob?

$
0
0
Hey everyone,

I'm running the latest development version of Hashcat (previously was running 3.5). One thing I've noticed is I can request checkpoint quit and hashcat just happily keeps going until it's finished or until I force a quit - for example over a time span of 16 hours, requesting a checking point quit at around 10 hour mark, it'll keep going for the last 6...

Recently I threw a huge wordlist at it to the point it would take 4+ days to complete, 12 hours into the sessions I requested a checkpoint quit... 12 more hours later and it still didn't hit a restore point. Restore point sat at 0% the whole time.

Am I missing something obvious here? It always worked for me in the past - at most taking 30 minutes to hit a checkpoint... Only difference was I was using an older GTX 960, now I'm using dual GTX 1080 Ti's and latest development version. If anything I would've thought I'd hit the restore points quicker Sad

P.S.

Using WPA/WPA2 mode with anywhere from 5000 to 30,000 rules.

Piping speed

$
0
0
Is there any way to increase cracking speed through piping?I'm only getting a max. speed of 2000 KH/s(NTLM) compared to the 1300 MH/s speed of cracking without piping!If that's not possible,then is it possible to use -r parameter of mp in hashcat?Plz,I need a solution fast!

Epic cracking!

$
0
0
Decades before,an epic hash cracking has took place and very few people know about it.To exploit the weakness of DES encryption,a community of people-known by the software they used to crack the DES algorithm "DRESCHALL",took the world by storm-as they took only 4 months to crack the encryption which consisted of more than 4 quintillion combinations,even with the poor computing power of that time.

They achieved this goal by making use of Internet-by distributing their DRESCHALL client to anybody who is interested and who can afford an Internet connection and spare their valuable computing power.They distributed the key spaces through this client and made cracking faster.They managed to get more than 5000 clients from Canada and got an average speed of 3 TH/s,something which is available with an expense of a single GPU,these days!

Anyway,I just wanted to say that-if such a client is released these days,then even a 20 char long hash can be cracked within minutes,but nobody is interested, what to do?

Support for layered hashes?

$
0
0
Please excuse me for my inexperience, I truthfully barely have programming experience/knowledge of how the software works (but I greatly appreciate everyone who has developed it!) I know that the basics of password cracking involves brute-forcing/taking plain-texts from a dictionary, hashing them with a specific algorithm, and comparing the resulting hash to the hash you are trying to crack until it yields a match. I have a couple hashes that were hashed with separate algorithms, and trying to crack these to yield another hash will likely take more time than there is stuff in the universe (and then, you still have to crack the other hash again). 

My question is basically if it's possible to bruteforce plaintexts and hash them with multple algorithms before comparing them, it will be slow but not as slow as working the other way around. For example, say you have hashes that you know were first MD5/SHA-1'd and then Bcrypted. This would be a lifesaver if it were possible, consider implementing it hashcat team Smile

CSV, hashes and username...

$
0
0
hello folks,

I seem to be at a loss and have gone down several rabbit holes.... the "--username" flag, if iv understood correctly, works only if the "hashfile"  where the hashes and username are locaited is written out in the following manner;

username1:hash1
username2:hash2
username3:hash3
username4:hash4
...and so on... correct?

the reason im asking you this is because im having a hard time cracking a list of hashes found in a txt file and then re-combining these hashes to their user name...

when one uses the -o flag the file will only show the cracked hashes, supposedly one is then to compare the specified outfile with the potfile to see which hashses have not been cracked? 

iv tried the --"show" and "--left" flags but I must be using them incorrectly....basically my goat would be that hashcat writes out the list in exactly the same order as the "source" list and eventually omitting the un-cracked hashes..so it would look something like this.....

"hashfile.txt"

username1:hash1
username2:hash2
username3:hash3
username4:hash4
and so on

"outfile"
username1:cracked hash1
username2:hash2
username3:hash3
username4:cracked hash4
and so on....

not sure if any of this makes sense....
while im at it, can hash cat read CSV files as a "hashfile"?

thank you in advance

P.s I can provide the list of username and passwords should you need them....

hashcat stops after about 37 minutes

$
0
0
Hi,

I've got a large number of hashes and for each one I've got a very serious candidate that just need some mask added to get the real password.
So I've made a script that launch hashcat with my candidates (base word + case toggle) against all hashes that share the same "candidate".
The command looks like this:

Code:
./hashcat64.bin -a 6 --increment -m 120 "/foo/bar/hc-tmp/${f}.h" "/foo/bar/hc-tmp/${f}.wl" -1 ?l?u?d ?1?1?1?1?1?1 --potfile-path=/foo/bar/bouclehc.pot --status --status-timer=60 -w 4

Things go smoothly, at least until I reach an increment that brings time above 37 minutes. Strangely, hashcat will just end the session when it reaches about 37-38 minutes. It means it won't finish the last mask (?1?1?1?1?1?1).
Here are two examples:

Code:
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: sha1($salt.$pass)
Hash.Target......: **********************
Time.Started.....: Thu Jul 27 13:12:01 2017 (37 mins, 49 secs)
Time.Estimated...: Sat Jul 29 02:38:36 2017 (1 day, 12 hours)
Guess.Base.......: File (/foo/bar/hc-tmp/haefxsdrgbh:.wl), Left Side
Guess.Mod........: Mask (?1?1?1?1?1?1) [6], Right Side
Guess.Charset....: -1 ?l?u?d, -2 Undefined, -3 Undefined, -4 Undefined
Speed.Dev.#2.....:   431.4 MH/s (0.93ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 988836593664/58163441238016 (1.70%)
Rejected.........: 0/988836593664 (0.00%)
Restore.Point....: 1024/1024 (100.00%)
Candidates.#2....: aefxsdrgbhlxNROR -> AEFXSDRGBHt4G080
HWMon.Dev.#2.....: Temp: 71c Fan: 47% Util: 77% Core:1835MHz Mem:4513MHz Bus:16

Started: Thu Jul 27 12:34:55 2017
Stopped: Thu Jul 27 13:49:51 2017

and

Code:
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: sha1($salt.$pass)
Hash.Target......: **********************
Time.Started.....: Thu Jul 27 14:27:15 2017 (37 mins, 59 secs)
Time.Estimated...: Sat Jul 29 03:54:37 2017 (1 day, 12 hours)
Guess.Base.......: File (/foo/bar/hc-tmp/hnadinejame:.wl), Left Side
Guess.Mod........: Mask (?1?1?1?1?1?1) [6], Right Side
Guess.Charset....: -1 ?l?u?d, -2 Undefined, -3 Undefined, -4 Undefined
Speed.Dev.#2.....:   431.3 MH/s (0.93ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 988836593664/58163441238016 (1.70%)
Rejected.........: 0/988836593664 (0.00%)
Restore.Point....: 1024/1024 (100.00%)
Candidates.#2....: nadinejamelxNROR -> NADINEJAMEt4G080
HWMon.Dev.#2.....: Temp: 71c Fan: 47% Util: 77% Core:1835MHz Mem:4513MHz Bus:16

Started: Thu Jul 27 13:50:06 2017
Stopped: Thu Jul 27 15:05:15 2017

The script runs in a screen, and is basically a while true loop.

Any idea why hashcat would abort the session after about 37-38 minutes each time?

I'm not able!

$
0
0
I dont want to hack someone else password. I need hack my own yt channel because i dont know my password and my email is the old hotmail (unactive) 
Someone could help me?

Is hashcat able to utilize the cores in a Xeon PHI ?

$
0
0
Looking at getting a 68 core Xeon PHI and wondering if hashcat can make use of it?  There is an OpenCL runtime for it..

CUDA?

$
0
0
Does hashcat not actually use CUDA for Nvidia cards now? I'm puzzled over the fact that there's no .cu files on github but there are many .cl files for OpenCL. I keep thinking back to (now outdated) cudaHashcat vs oclHashcat and find myself quite confused over this.

I'm doing a research project for school where I'm making a CUDA md5 cracker, and while programming my own md5 implementation in CUDA, I was thinking of using hashcat's CUDA md5 for good measure to compare against mine/to have a well-implemented version since mine is bound to not be ideal.

Now that I actually look, however, this doesn't seem to be the case. I've already committed to using CUDA specifically for my project so I don't want to just switch to OpenCL. Secondly, I thought OpenCL was noticeably slower on Nvidia cards compared to CUDA due to Nvidia's snail-pace at supporting it? Hasn't it still not gotten OpenCL 2.0 support yet?

Thanks! (I wasn't sure if this belonged in the developer or support forum more, please move if I chose incorrectly)

1080 Ti heat temps

$
0
0
I have a 1080 and a 1080 Ti in the same mobo, I just bought the 1080 TI today and it's hitting a temp of 85c and just staying there consistent even with fan at 100% whereas my 1080(not TI) requires 55% fan to stay around the 60c mark.

Is this normal? Anybody else have the same thing?

Intel(R) Pentium(R) 4 CPU 2.80GHz best GPU

$
0
0
it is an old rig that cannot do much! but I want to get maximum out of it with hashcat instead of bulk of steel in the corner of my room so I am looking for the best match gpu which is compatible with it and hashcat or hashcat legacy on Lubuntu or ubuntu.

Code:
current specifications :

product: Intel(R) Pentium(R) 4 CPU 2.80GHz
          vendor: Intel Corp.


 System Memory [b]( I will upgrade this too)[/b]
          slot: System board or motherboard
          size: 512MiB
          capacity: 3GiB

Display:
description: VGA compatible controller
                product: 330 [Xabre] PCI/AGP VGA Display Adapter
                vendor: Silicon Integrated Systems [SiS]

current hashcat legacy benchmark (PART):

Code:
Initializing hashcat v2.00 with 1 threads and 32mb segment-size...

Device...........: Intel(R) Pentium(R) 4 CPU 2.80GHz
Instruction set..: x86_32
Number of threads: 1

Hash type: MD4
Speed/sec: 3.66M words

Hash type: MD5
Speed/sec: 3.19M words

Hash type: SHA1
Speed/sec: 2.74M words

Hash type: SHA256
Speed/sec: 1.77M words

Hash type: SHA512
Speed/sec: 664.14k words

Hash type: SHA-3(Keccak)
Speed/sec: 488.86k words

Hash type: GOST R 34.11-94
Speed/sec: 381.83k words

Hash type: SHA-1(Base64), nsldap, Netscape LDAP SHA
Speed/sec: 2.74M words

Hash type: SSHA-1(Base64), nsldaps, Netscape LDAP SSHA
Speed/sec: 2.50M words

Hash type: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
Speed/sec: 3.85k words

Hash type: sha256crypt, SHA256(Unix)
Speed/sec: 252 words

Hash type: sha512crypt, SHA512(Unix)
Speed/sec: 127 words

Hash type: bcrypt, Blowfish(OpenBSD)
Speed/sec: 511 words

Thanks
Viewing all 8095 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>