Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8126 articles
Browse latest View live

Rules possible?

$
0
0
Hi!

I have a RAR5 hash that i want to decryt or almost I try, I Know that is a lower case 8 - 9 length and it is a word in spanish without rare charset. 

I want avoid the previous letter is equal to the next to avoid aaaaaaaaa and start with something like abcdefghi

I not really sure how to achive this rule with the info present in the wiki.

Thanks.

VeraCrypt cracking always Exhausted

$
0
0
Hello,
I am sorry but I can't get it working with standard vera-crypt-containers.

Therefore I just created 4 folders with combinations of SHA512, Whirlpool and AES, AES/TWOFISH/SERPENT to try all available hash-modes which I prefer and that are in FAQ:

-m 13721
-m 13723
-m 13731
-m 13733

So I created 4 basic containers with each encryption-mode, set the passwort to "mic" (3 letters) and extracted their first 512bytes and pasted them with notepad++ into new hash-files (see screenshot).
Then I used command

Code:
hashcat64.exe -m 13721 -a 3 Hash.txt ?l?l?l
pause

to let hashcat brute-force the 3 letters of this simple password.
It finished after ~3 minutes but it did not crack it.

?

LINK: SCREENSHOT
[Image: unkenntlich.jpg]


I double-checked the hash-file, the right hash-mode, encryption-mode, the FAQs and the password (vera-crypt can decrypt it!).

Why doesn't it work?

Thanks in advance.

HMAC-SHA1 with an MD5 key

$
0
0
Hi all,
I would like to recover the key used to sign a message with HMAC-SHA1. I know the key was generated using MD5: 

PHP Code:
$hash = hash_hmac('sha1'$messagehash('md5'$keyfalse)) // Sample php code that generated the hash 

Lets say the original key is 5 characters long alpha only. That would be 26^5 combinations instead of 2^128.
Is it possible to use hashcat in that way ?

Thanks for your time.

Perfomance drops / not a heat problem

$
0
0
Hi all,

I find that the speed of my GTX 1080 graphics card in connection with WPA2 drops from about 420 kH/s to approx. 31,000 H/s during approx. 2 minutes.

I have checked that I have the latest driver and that there is no dust that prevents cooling.

Constant temp. readings: Dev.#1.....: Temp: 57c Fan: 33% Util: 92% Core:1936MHz Mem:4608MHz Bus:16
Watchdog: Temperature abort trigger set to 80c
Watchdog: Temperature retain trigger set to 75c
I have previously not experienced a decline in speed.

Do you have any suggestions for what I can do?

Thanks in advance.
gg

Help needed.

$
0
0
I have a set of password hashes and salts. The password hash is created in a following way: SHA256(Static_salt+password+salt) then its output has been converted into hexadecimal format and truncated to 32 characters. I know the static salt. How do I create a set of rules for this case?

edit: forgot the sha256 conversion

bitcoin mining vs password cracking?

$
0
0
i know this is not a password cracking topic so that is why i am asking in general.

i have a geforce gtx 960 gpu and i was wondering since bitcoin uses sha-256 hashes can i use the hashcat benchmark result  to have an idea of bitcoin mining?



yes there are bitcoin miners that use nvidia gpu but unfortunately google search does not show the bitcoin sha-256 results.


if anyone here has done bitcoin mining and can report their results for both password cracking and bitcoin mining it could potentially save me installing windows or ethos just to be pulling my hair out.

Hybrid attack

$
0
0
Hi,

I am new to the hashcat, and I cant find a way to make this working for wpa2 cracking

Is there a way, beside wordlist (i tried, works great but very large files) to make somthing like this

Lets say I know one part of the password, for this example "bill"

I want to make hashcat do like this ?d bill ?d?d?d, I tried hybrid attack, but could only make it left or right.


thanks

Type of hash

$
0
0
Hey,


I have been looking for a few days for the type of hash:


e****045****ef****66d9****06a****1a****e
4****2de****7da****6c****e70c****2d****5
3****3ffffbf0****a8de****3e7c3****b9**b6




At first I was told that the type of hash was the SHA-1 but after several attempts to decrypt the 28,000 hash in bruteforce, wordlist there was no result. 
So if someone could find me the real type of hash its would be very nice. I thank all help

correct command line

$
0
0
Hi,

Recently i created a veracryp.hc file. And putted some stuff in there.
I didnt know atm but my keyboard was faulty (registrating keys double). So i created a plain text file with several passwords in it with enters like:

1
12
123

1. im not sure if it needs to be comma separated or not.

Anyway I have diffucilties with hascat as a never used it.
There ia also a PIN, that could be 4 different numbers.

which command should i run?

Thank you much as i really need this file to open and im trying for several times without sucess.

RAR file password

$
0
0
I am beginner for this.
Any one can tell to me how do LBF to RAR file

Is this hash supported

$
0
0
Been searching through the forums and online, but i've not found a way to crack this type of hash. It may be something that I just don't understand.

Is this format supported by hashcat and i'm just overlooking it? If not, any suggestions on what would support this hash?

md5(md5($s).$p)

Thanks.

Any place to download wordlists in various languages?

$
0
0
As thread subject suggests, I'm curious if anyone knows of places where I could download wordlists for various languages but in latin alphabet. 

Working on some hashes that I'm struggling to crack, and thought I'd give it a try to use wordlists based on other languages than major western ones (English/German/Spanish/etc) in the various attacks.

I know there exist "accepted" translations of e.g. Urdu and Arabic words to the latin alphabet, and I assume that this probably exists for e.g. various languages from countries in Africa; but so far I haven't been able to find anything good (started this week, so might be I haven't given it enough time yet, but it doesn't hurt asking).

Warp Wallet Challenge 2

$
0
0
here you can find an interesting challenge about cracking a bitcoin "brain wallet". 
Privatekey is derived from a passphrase is 8 characters long, only alphanumerics. For example, 'b234FEzz'. the salt is a@b.c

I've found a github repo tryng to brute force using a CPU only GO script, any idea how could perform hascat with an ad-hoc algorithm?

here hashing detail:
s1 = scrypt(key=(passphrase||0x1), salt=(salt||0x1), N=218, r=8, p=1, dkLen=32)

s2 = pbkdf2(key=(passphrase||0x2), salt=(salt||0x2), c=216, dkLen=32, prf=HMAC_SHA256)
keypair = generate_bitcoin_keypair(s1 ⊕ s2)

How to crack phpass(md5($pass))

$
0
0
Hi
I have a hash list with phpass(md5($pass)) hashes.
How to crack this kind of hashes with Hashcat?
There is no hash-mode for this. what should i do?

what am i doing wrong?

$
0
0
./kwp basechars/myfull keymaps/en.keymap routes/2-to-16-max-3-direction-changes.route -b  1 -s 1 -a 0 -1 1 -2 1 -3 1 -4 1 -5 1 -6 1 -7 1 -8 1 -9 1 -n 1 -x 4 | grep 1q2w3 
even going higher  wont work 1q2w3e4r5t6y or 1qaz2wsx3edc or !Q@W#E$R%T^Y 
but it dosnt seems to work :o

Hashcat on FPGA (old bitcoin miners)

$
0
0
Hey guys ,
I been using oclhashcat on my mid gaming rig , thnx for creating this tool 
But yesterday I discovered this 
https://www.sump.org/projects/password/
https://hashcat.net/forum/thread-5559.html

They all are about using FPGA but only theory with no tutorialsn
Being completely new to FPGA , I would like to help on building a FPGA cluster or single FPGA for hash cracking 

I also found 
This paper :https://arxiv.org/abs/1605.07819
Video : https://youtu.be/0wWa9dfEVgw

Above is specifically what I would like 

Assuming I already have opencl compartiable FPGA board , what's next?
Should I just plug it in my PC > Install drivers > Run hashcat and it will detect the FPGA ?

Thank you for your time

Non-ascii rule issue

$
0
0
Within a ruleset I have two rules that are failing (invalid/unsupported error) and they are the only two lines that contain non-ascii characters. These two lines however are accepted on other sets of hashes I've tried, so (assuming that non-ascii is the reason for the error), what circumstances dictate whether hashcat will allow them or not? I couldn't find anything in the wiki about this. 

Thanks.

.png   nonascii.png (Size: 2.59 KB / Downloads: 4)

hashcat v 4.0.0

$
0
0
Hello
As I see on github is already version 4.0.0 :
https://github.com/hashcat/hashcat/blob/...hanges.txt

I am interesting in feature “Added support to crack passwords and salts up to length 256” 

When you plan to release new version?

Is it possible to download v4.0.0 binaries for Windows right now?

Thank you!

Hash Benchmark Much Slower Than Expected

$
0
0
Hi,

I am a newbie here, so please bear with me. After previewing this post I see the substitution for my Linux distribution and it made me chuckle. Any and all advice from people who know is awesome.

I recently got a GTX1060 and set up The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux, then followed the instructions on here to get my drivers set up. If it's important, I am also dual-booting from a previous Windows install, followed these directions to get that set up.

When I run
Code:
hashcat -b
I get the following:

Code:
hashcat (pull/1273/head) starting in benchmark mode...

* Device #2: Not a native Intel OpenCL runtime. Expect massive speed loss.
            You can use --force to override, but do not report related errors.
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1060 6GB, 1518/6072 MB allocatable, 10MCU

OpenCL Platform #2: The pocl project
====================================
* Device #2: pthread-Intel(R) Core(TM) i5-2500K CPU @ 3.30GHz, skipped.

Hashtype: MD4

Speed.Dev.#1.....:  9970.0 MH/s (67.28ms)

Hashtype: MD5

Speed.Dev.#1.....:  5768.2 MH/s (58.14ms)

Hashtype: Half MD5

Speed.Dev.#1.....:  3884.5 MH/s (86.35ms)

Hashtype: SHA1

Speed.Dev.#1.....:  2159.7 MH/s (77.65ms)

Hashtype: SHA-256

Speed.Dev.#1.....:   836.5 MH/s (50.11ms)

...

This differs significantly from what I found on this Hashcat Forum post, and I'm wondering if I've set something up wrong.

The command
Code:
clinfo | grep -i "icd loader"
shows the exact same loaders as the The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) NVIDIA Drivers Guide that I referenced above.

The command
Code:
nvidia-smi -i 0 -q
shows the attached GPU and clock speeds.

Code:
==============NVSMI LOG==============

Timestamp                           : Mon Oct  9 18:10:50 2017
Driver Version                      : 375.82

Attached GPUs                       : 1
GPU 0000:01:00.0
   Product Name                    : GeForce GTX 1060 6GB
   Product Brand                   : GeForce
   Display Mode                    : Enabled
   Display Active                  : Enabled
   Persistence Mode                : Disabled
   Accounting Mode                 : Disabled
   Accounting Mode Buffer Size     : 1920
   Driver Model
       Current                     : N/A
       Pending                     : N/A
   Serial Number                   : N/A

Code:
Max Clocks
       Graphics                    : 1974 MHz
       SM                          : 1974 MHz
       Memory                      : 4004 MHz
       Video                       : 1708 MHz

Any other output I can get to be more helpful? Thanks for any and all help. Excited to crack some hashes

network cluster cracking

$
0
0
I recently been using hash cat and after week of playing i finding it to be a very very powerful tool 

id like to use my network at home to crack passwords on the fly and using the 2 titans i get 1000k/hz witch i think is good , but i have 2 servers with gpu's 980ti and gtx 770 and a gtx 980 over 2 other systems i see hashcat supports network and maybe over internet but have no guides or demos or write-ups on how to do it anyone one tryed this ? windows or Linux can i use my windows pc ? how would i ssh in to a server and get it to start a job over all the 3 computer maybe 6 if you can do it over internet 

thanks for any guidance

also i been using piping to do cracking if that makes a difference
Viewing all 8126 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>