Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8126 articles
Browse latest View live

Budget New Builder Questions

$
0
0
Hello all, 

the last couple of days I been reading a lot about building a mining rig or password cracking rig. To me they seem the same thing. Since I been playing a lot with hashcat and wordlist i thought i would just build a password cracking rig for hashes and wpa2. 

Like i said since I"m new I need to figure out the hardware I need to buy. I'm on a budget at the moment since having a baby couple weeks ago. I"m thinking around $600 to $800 if possible i know it's not much for now but need to find good deals around.  But Im hoping down the road I will put more money into the rig or even more cards for faster cracking. 

I might use it for mining while at work then when i'm at  home switch over to cracking hashes. Since I'm a newbie I was thinking of running linux version since that's what I work at home ... 

Trust me I looked around youtube and other sites for basic configuration to start with and adding more down the road.

Hybrid attack splitting

$
0
0
I have noticed the hashcat keyspace in both hybrid attacks (-a 6 and -a 7) is determined by the number of passwords in dictionary. That means, when I want to split the attack into more instances, my --limit and --skip arguments affect these dictionary passwords.

However, the mask can be quite long and the instance for a single password + mask can take hours, days or more to finish. For example, this instance with 1 dictionary password would take 3+ days for me:

Code:
hashcat64.exe -m 3200 -a 7 test.hash ?l?l?l?l?l smallDict.txt --limit 1

Is there a possibility to split this job into more instances, that would each take less time? Maybe by affecting the start/stop-indexes of the mask?

Looking forward to your answer!

How To Run Hashcat ON RDP/VPS

$
0
0
Hi,

I have created RDP using "Google Cloud" with 8 cores and 56 GB of RAM. When I try to run hashcat, I get the
following error:

Screenshot: http://prntscr.com/gpe5ul

Mask PWD

$
0
0
hello, i need help with mask hashcat-cli64

i need to know how to add tables like Abc123 , abc123,  ,Abcdef , abcdef ,

Built-in charsets
   ?l = abcdefghijklmnopqrstuvwxyz
   ?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
   ?d = 0123456789
   ?s =  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
   ?a = ?l?u?d?s
   ?b = 0x00 - 0xff


will be like this Abc123  (?u?l?l?d?) or what ??

What is best bruteforce dictionary for cracking Wifi Handshake File?

$
0
0
I have already tried Rockyou & Crackstation dictionary but no luck, can you guys recommend any other good dictionary wordlist?

hash-password check order in straight attack

$
0
0
What is the order of hash-password checking in case of straight/dictionary attack?
What is the operating principle of hashcat?

Lets's say I have 10 hashes:
hash1
hash2
hash3
etc.

My dictionary contains password1 to password100:
password1
password2
password3
etc..

Hashcat take the 1st hash (hash1) and then try all the password from password1 to password100, then take the 2nd hash (hash2) then try all the password again from password1 to password 100, etc..?

or hashcat take the first password (password1) and try to find match from hash1 to hash100,
than take the second password (password2) and try to find match from hash1 to hash100, etc...

Could you explain it or send a link for the answer?

Thank you.

Hashcat rule help.

$
0
0
Example email: hashcat@hotmail.com

If I try to append $1$2$3 it will be hashcat@hotmail.com123

Preferably I would want - hashcat123@hotmail.com

Basically my question is, how to can I append things before the @

Experiences Using Prince Mode

$
0
0
Hi All, 
    I don't know if I'll ever get around to finishing it but I'm thinking of writing a guide to using Prince to generate password guesses. For those not familiar with Prince the base code is available at https://github.com/hashcat/princeprocessor, and is included by default in JtR bleeding-jumbo release.  In a nutshell Prince takes all the words in an input dictionary and combines them multiple times. It's actually much more sophisticated than that description makes it sound like and if you are curious about more of the details I have a very outdated blog post on it at http://reusablesec.blogspot.com/2014/12/...rince.html. This forum post is a attempt to get more information to update it. What I'd like to know is other people's experiences using Prince. If you've used it and are willing to share I'd appreciate it if you could respond to this thread. I'm sure other people would be interested to hear what you have to say as well!  

To kick things off I've found it's extremely helpful when using Prince to include a short bruteforce in my wordlist. For example, all values 1 to 3 letters/digits/special characters long. Now, you certainly could limit that to only likely characters, but I usually find myself using Prince on fast hashes so I'm not too focused on optimizing it.  The impact of doing that seems to be dramatic vs only using an input dictionary containing cracked passwords. For example, '1' might not be a valid password, but if '1cow1pig', is the password you are trying to crack then without that '1' you likely won't create that combo.  Also, I tend to use Prince as a bridge before I do incremental/mask attacks. Aka it's usually not the first attack I run, but I've had good success just letting it go if I don't want to put to much thought into a cracking session and PCFG/dictionary attacks are slowing down.  Side note, I've heard many people mention the "prinception" attack where you create an input dictionary using prince then feed that into another instance of prince. I have to admit this puzzles me a bit as it seems like you could get the same results by increasing the number of combos. I'm probably missing something, (I could see the order it makes the guesses being very different due to how PRINCE ranks the chains) so feel free to comment on that.  

Thanks! Also I apologize for the double posting here and to the john-users mailing list (archive here: http://www.openwall.com/lists/john-users/2017/09/25/1) but I'd like to get feedback from both cracking communities.

Matt / Lakiw

This device's local mem size is too small.

$
0
0
Hello guys,
This my first time using hashcat, and i think i have a little problem over here...

Here is some informations/screenshots that can explain more :

Error message : (Click to view)
hashcat version :  v3.6.0 (Click to view)
My laptop specs Driver : (Click to view) / more info's : (Click to view)
Operating system : Windows
Hash type : WPA/WPA2
Attack mode : Brute-force

Thank you so much in advance!

5 question around

$
0
0
Okay im Actually running these command
Code:
hashat -m *hash type* --username --outfile-format 2 --outfile=*here your directory of outfile* *here you user_hash* *wordlist file directory*
with --force at the end cause i dont have OpenCL installed yet .

1- I go to download OpenCL for my intel GPU and it says they already installed(maybe my hosting installed them? idk but in hashcat witouth --force it dosnt works.

2- New to hashcat, 13200 KH/s is a good number for a strong powerfull server? (64GB Ram Quad core i7 7700k)

3-When i use these command in the output just the hashes deshased appeards, not user:plaintext password any idea why is this? im doing something bad?

4- One off my user:hashes seems to not be working for hashcat cause inside () there is nothing

Code:
Hashfile 'C:dir\hash.txt' on line 31107 (): Line-length exception

5- I download more than 260GB off passwords and are mostly shit cause takes a while to check all and it just recovers 7% from a user:hash in 15h ( 1500 from 65k). What do you recommend me for have a good wordlist to deshash mostly more than 70-80%

Problems with OpenCL

$
0
0
I am following the following tutorial:
https://mark911.wordpress.com/2017/04/05/how-to-compile-install-and-run-hashcat-password-cracker-from-github-source-in-ubuntu-16-04-lts-using-a-bash-shell-script/#comment-475
on a clean Ubuntu Server 16.04 LTS (as Amazon t2.micro EC2 instance).

However, trying to run a basic dictionary attack, I get:
Cannot find an OpenCL ICD loader library
After some research I did
sudo apt-get install olc-icd-libopencl1
but when I run hashcat again , I get:
clGetPlatformIDs(): CL_PLATFORM_NOT_FOUND_KHR
sudo apt-get install olc-icd-libopencl1-dev, to no avail.
There seems to be no solution to this error anywhere. What am I missing here?

Most Effective Time Clues?

$
0
0
I mean:

I am not searching someone to tell me  where to get the best wordlist, i am searching any suggestions from profesional members for a rockie to deshash most effectively time/hash found, what is best way? any wordlist or making my own? and based in what?.


Also rules? what are? where i can check them, is there any rule better than other for specific cracking?.


Any good way to start learning these program(confused for me) i just know basics and whant to learn it better for see what im doing bad/good how can i improve.

Iterated sha256 cracking with no salt

$
0
0
Hi,

I have some about 5 million strings of the form NNNNNLYYYYMMDDXXXXX , where

N=[0..9]
L=[A..Z]
YYYY is a number between 1920 and 2000
MM is a number between 1 and 12
DD is a number between 1 and 31
XXXXX is a small set of numbers (e.g 12345, 54321, 23456, etc.)

each one has been fed to a iterative SHA256 of around 2000 rounds and I have the resulting hexdigests, so

hex = sha256(sha256(sha256(....(sha256(str)))))

I have the hashes. Is there a way to have hashcat bruteforce this? Or any way that I can use the accelerated GPU code of hashcat to implement my own brute force script?

I have tried to feed this to hashcat as:

$5$rounds=2000$$<b64 version of the hash>

, as there is no salt, but I don't really know what I'm doing here and hashcat doesn't like the hash.

Thanks in advance,

koala

Hash I do not recognize

$
0
0
Hi everybody,

I have been trying for 2 days now to recognize it's hash then the decrypters thereafter.



2072f83e5964ae1505b85bb723ecc0e242940e6b

28155b96bf999Xce36e1ac3d7c4dX04f9c191b5e
4955dacb50580eca18Xc3cbc84d237e36081be94
cd08dd32cdeX1b060544989976X5bfc46d55b12b
5d4b13c1e5Xd4d8fe2b4eeX984c291f5b8a61e77
bf38e64ceb039X68327cX2c0698a23533943639c


The hash identifier tells me that this is SHA-1 or MySQL5 - SHA-1 (SHA-1 ($ pass) but it does not work...


https://gyazo.com/972169ca95d215903be3730c5615902d

So I would absolutely crack that hash

Thanks in advance for all help.
So I would like to know that it is a type of hash so that in later I can decrypt it.


UTF-8 dictionaries (hex format)

$
0
0
Would anyone know of a good source for hex formatted, non-English UTF-8 dictionaries for use with the --hex-wordlist option that hashcat provides?

Short of that, has anyone come up with rules for substituting single-byte characters with two-byte characters that some foreign languages use?  German would be one example.

These can be built with existing dictionaries that use single byte characters.

Take existing single byte foreign language dictionaries, convert them to hex, replace the applicable hex codes with their UTF-8 equivalent and have more effective foreign language (non-English) dictionaries.

For example, the German letter, Ü would be C3 9C in hex.

In this example, a script that does search and replace for hex codes 75 and 55 (u and U respectively) would replace those hex numbers with C3BC and C39C (respectively).

For this example of the letter "u", single byte hex is converted to its corresponding UTF-8 2-byte hex representation.

u = 75
U = 55
becomes
ü = C3BC
Ü = C39C


Also, this is straying off the topic of this post, but something similar could also be built for doing this type of substitution of ASCII characters with their single-byte LATIN1 equivalent.  This would be for non-English dictionaries that are using non-English words with only ASCII characters.

There are a lot of non-English dictionaries publicly available, but so many of them are using only ASCII characters for their words.  I see this the most with Spanish dictionaries.

Footnote on this character, Ü:
https://en.wikipedia.org/wiki/%C3%9C

This character is actually common to several non-English languages, not just German.  Stolen from the wikipedia page: "HungarianTurkishUyghur LatinEstonianAzeriTurkmenCrimean TatarKazakh Latin and Tatar Latin alphabets"

Basic hashcat issue - beginner

$
0
0
Hello there,

I am new to hashcat and I have got a problem with cracking a vera-crypt-container with a KNOWN password.
Unfortunately I forgot a quite long password but I still know the components of the password.
With a simple wordlist (severel spellings of some words etc) I could find out what it was.
So I created a wordlist of 155 words and thats it.

The container-format is AES and SHA-512 --> mode -m 6221 i guess.

But before I use this I wanted to test hashcat with a new container with test password "hashcat".
And a wordlist containing:
Code:
H4shcat
Hashcat
hashcat
hashcaT

Or I use only one word: "hashcat"

Here comes my little problem.

Quote:* Device #1: WARNING! Kernel exec timeout is not disabled.
             This may cause "CL_OUT_OF_RESOURCES" or related errors.
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Uses-64-Bit

Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 75c

Dictionary cache built:
* Filename..: dummy.dict
* Passwords.: 1
* Bytes.....: 8
* Keyspace..: 1
* Runtime...: 0 secs

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: TrueCrypt PBKDF2-HMAC-SHA512 + XTS 512 bit
Hash.Target......: dummy.hash
Time.Started.....: Thu Sep 28 11:12:44 2017 (0 secs)
Time.Estimated...: Thu Sep 28 11:12:44 2017 (0 secs)
Guess.Base.......: File (dummy.dict)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:        0 H/s (0.40ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 1/1 (100.00%)
Candidates.#1....: hashcat -> hashcat
HWMon.Dev.#1.....: Temp: 57c Fan: 30% Util: 99% Core:2037MHz Mem:4714MHz Bus:16

Hashcat can't even find the password when I tell him the right one...
What am I doing wrong?

I extracted the first 512 bytes of the dummy-container with HxD (Hexeditor) and pasted it into a textfile (*.hash).
I created a dictionary-textfile and entered the "hashcat"-password (*.dict).
I used
Code:
hashcat64.exe -m 6221 dummy.hash dummy.dict

pause
for launching hashcat.

Can someone please help me?
I can't find the problem since two days.

Here a pic of the hash-extraction.
Is there maybe a problem? Wrong format?
[Image: unbenannt.jpg]
Hash:
Code:
..O"õ..Ñ3..6.û.V-í€Öâ–GD^.DÂm¯.F<m.èP\..è¢.¶×'¸îýØŠ .Câ2æåü1'ÿrãýîÇ..xR%£„ýºe!.æ5h.‹.}iíÇöAK.X÷Àá5Aâ~(á.ü+.–ˆpj@H¤.XKÔ—.é.þa8p?.ò:8©²—¾þ†-.ºUÐ..vÀñ‰±<ãé€ÎGË#$*àX¶..¯@Ú?.IÖÁ‰.| j2çã7çGe¡€DJÒ€£9üÊWO}Â.44©.Ñ1xê‘ø[†.Ø8¢º.0Nö5¡¨Ör_./.(âW.s–±%.mÔ÷o.WÊP#}%vÁBeAVΖ޼.|:óôV.ìÝÃàEî`.4-/Kù.²¯‡øZ¾´p¤.k+n@îHq.ž¼îa†Æœ;â¾Å.ªpÏŽV…®ò_Y.Âø.5Qç:.{úI›e¤“ùXv.6Í0È4..…’¹ÛN?9cô»jmµIÂIËÝb..yÊ¿…^gAø%t]³d“Æ.y.Vš‚ˆ.³.±X.ÛT¤?›l'.ãzô.8..÷2Á]ª..<óa³  Äs*«.Ò.\OÖLj¦÷{·”®Ø¾§3¦wO¦1“.aÖ.š.ÁÜÊŸv»7”r.ž.ƒA™š¶«a«.§ƒñXc…QpÐù.$.˜¥ÉJÍ!óŠÛkf³ts.3Ë.Š.
Password: "hashcat"

Can someone check it?

Thank you!

Rule based attack, statsprocessor,princeprocessor not incrementing.

$
0
0
Hello,

I am using the latest verison and I have notice something weird. When using rule based attack, or after I installed statsprocessor and princeprocessor I noticed that it doesn't increment through the wordlist. It will just either apply the rules for the first word or either sit idle. Has anyone else experienced this?

OpenCL Installed=No Detect.

$
0
0
* Device #1: Intel's OpenCL runtime (GPU only) is currently broken
             We need to wait for an update of their OpenCL drivers
             You can use --force to override this but do not post error reports if you do so
No devices found/left


We need to wait for an update.


Im using windows server 2016 

GPU: 
Name

Intel(R) HD Graphics 630

CPU: Intel® Core™ i7-6700 Quad-Core


The million dolar question. Do you install OpenCL?
No, i just install the manager and updater now, but before happens the same, i just ask to hosting if they pre install openCL drivers but i dont think so.


I know it will not but any way off working witout --force so i can use GPU?

Sort and de-dupe without merging together?

$
0
0
Is there anyway to "sort and de-dupe" the entirety of my Wordlist folder without merging them together?

It's hard to explain what I exactly mean, hopefully someone understands, lol.

Line length exception with example MD5 hash?

$
0
0
Hello,


I have got a simple problem and cannot find the mistake.
Since today my hashcat gives me "length exception"-errors when I try to crack the example MD5 hash from the FAQ.

0
MD5
8743b52063cd84097a65d1633f5c74f5

I pasted the hash with a hexeditor in a file (16 Bytes)
Code:
87 43 B5 20 63 CD 84 09 7A 65 D1 63 3F 5C 74 F5
and called it md5.hash

I use

Code:
hashcat64.exe -a 3 -m 0 md5.hash ?a?a?a?a?a?a?a

pause

I do everything like said in the faq. What is causing this error?
The mode is set on brute-force with 7 characters.
Hashcat does not even try to brute it.
Seem that the hash_mode does not fit the hash...

Code:
C:\Users\xxxxxxx>hashcat64.exe -a 3 -m 0 md5.hash ?a?a?a?a?a?a?a
hashcat (v3.6.0) starting...

* Device #1: WARNING! Kernel exec timeout is not disabled.
            This may cause "CL_OUT_OF_RESOURCES" or related errors.
            To disable the timeout, see: https://hashcat.net/q/timeoutpatch
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU

Hashfile 'md5.hash' on line 1 (çCÁ c═ä  zeÐc?\t§): Line-length exception
No hashes loaded.

Started: Fri Sep 29 09:03:44 2017
Stopped: Fri Sep 29 09:03:44 2017

C:\Users\xxxxxxx>pause
Viewing all 8126 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>