Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8030 articles
Browse latest View live

Status: Running, but no progress

$
0
0
Hi,
I need help, I have everything installed and now trying to run hashcat with code:
cd Downloads/hashcat-4.0.1
    ./hashcat64.bin -m 13751 --outfile /home/kamil/Desktop/Output  --session mysession9 -w 3 -a 0 hash.txt Lista.txt

The result is:
hashcat (v4.0.1-78-g185104b5) starting...

OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics, 3101/6203 MB allocatable, 23MCU
* Device #2: Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz, skipped.

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP

Password length minimum: 0
Password length maximum: 64

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Dictionary cache built:
* Filename..: Lista.txt
* Passwords.: 160000
* Bytes.....: 3392000
* Keyspace..: 160000
* Runtime...: 0 secs

[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => s

Session..........: mysession9
Status...........: Running
Hash.Type........: VeraCrypt PBKDF2-HMAC-SHA256 + XTS 512 bit
Hash.Target......: hash.txt
Time.Started.....: Sat Jan  6 14:51:45 2018 (2 mins, 41 secs)
Time.Estimated...: Sun Jan  7 02:06:01 2018 (11 hours, 11 mins)
Guess.Base.......: File (Lista.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:        4 H/s (84.94ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/160000 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/160000 (0.00%)
Candidates.#1....: 1234qwerasdfzxcv5tgb -> 1234WERSDFBVCX5tgb
HWMon.Dev.#1.....: N/A

What am I doing wrong? Is the command correct?
I've attached clinfo output if needed,

.txt   clinfo output.txt (Size: 15.19 KB / Downloads: 0)

Output file info

$
0
0
I know how to use the -o flag and the different output format modes to use. But I cant find one that would output the amount of time it took to crack said hash. i have a file with 8 hashes. Is it possible using the output format flag to also output the time it took to crack it. In mask attack mode (and im pretty sure many other modes) whenever it prints out the  stats, it also says how much time hashcat has been running for so far. 
Thanks in advance. Smile

Hashcat command

$
0
0
Trying to extract the password for an itunes backup. I have all the info required. Having trouble with the command though. Its for iOS 11

I have my own dictionary, and I only want the first letter capital.  What would that command be?

Help installing the right drivers.

$
0
0
First off, I'm sorry for posting this, I'm sure there are tons of other posts like this (and I've spent several hours looking for ones that'll help me) but I can't find the right ones.
Anyway I'll get to my problems, I just got a new GPU (PNY GTX 1060 3GB) and installed it in my desktop, I'm running Ubuntu Gnome 16.04 LTS with an Intel Xeon X3430, I've gotten the correct Intel OpenCL Drivers and have had no problems running the latest version of hashcat with it using just the CPU, the problems start with the GPU, I have the drivers from Nvidias website (NVIDIA-Linux-x86_64-384.111.run) and have ran it but what do I do after, do I have to change any configuration because the first time I ran it I rebooted and it froze at the first password screen (Not the login screen, the screen to decrypt the drive), I could't type or move the mouse or do anything at all. So a simple guide on how to properly install the drivers would be very helpful, if you need any more information just say so. Thanks in advance.

Also, Not sure if this helps at all but I have gotten the drivers to work in windows 10, I would much prefer using linux as it has been my main operating system for years but will switch to windows only if I absolutely have to. (I really would like to stick with linux)

Assistance building mask

$
0
0
Hello, I'm trying to build a mask to take a static string such as "Password" and increment numbers at the end for a maximum of 4 digits, but also add a special character after each iteration as seen below 

So, "Password1!" to, "Password9999!"

I always want to end the auto incremented number with "!"

thank you

Benchmarks for 16 x NVIDIA P104-100 GPU's

Ethereum Password Bug

$
0
0
Hi all, I'm trying to gain access to my Ethereum presale wallet. 

However, Ethereum has acknowledge the possibility of a bug in generation of wallet files.

https://github.com/ethereum/mist/issues/3513

It seems that it may only be an issue on an import/open with their official wallet, and other services are able to open the wallet. That would then mean that Hashcat could indeed recover the password. Right?

question about hccapx

$
0
0
Hello
I have a problem with encryption on hccapx file.
based on this page 
this is my password/keymic in  encrypted :9094e48390f2 
on this [Image: 14OoUjr.jpg]
and this is password as plain-text:13471378
based on this page it's "SHA1",but when  I go on this website select SHA1 and enter this string:13471378
website give to me different result e8a6673cb3b38ca1a3830422f08f0b672f58da3d
I need get same result (i mean enter 13471378 and get 9094e48390f2 )
actually i need c#/c++ source code or a website like this website

MD5 Help

$
0
0
Hello. I'm a totally novice at this cracking program. I'd like to brute-force the following hash with salt:
Hash: a8109761ea4400fcc188d53e89aff6d1
Salt: RWhwG2ww
Could you write me a right command that would decrypt it?

Mask Attack with a "blank" value?

$
0
0
Hi all, trying to get this to happen:

RIGHT SIDE:

Password?d?s

Password
Password1
Password2
...
Password!
Password@
...
Password1!
...
Password!1

In addition, how can I repeat the same process on the left? Resulting in

11Password1!
1@Password
Password!1
1Password1

Any help is insanely appreciated, this is the last step I need in my crackerr

Titan V benchmarks

Skipping X Amount of passwords

$
0
0
Whats the argument to skip lets say a million passwords? I tried --skip=1000000 but that gave this error:
restore value greater keyspace

aes128 brute-force w/mask using half sha256

$
0
0
Hello all,

I wish to try a brute-force/mask attack to recover a 128 bit aes key.

I have the following:
-*Only* the first half of the target key's sha256.
-A good portion of the target key itself:
CCCC CCCC xxxx xxCC
C=known
x=unknown

I suspect using a half-sha256 might be the biggest issue. But even if the option is not available, it seems like a only minor source code adjustment would be needed to do a half-comparison for sha256. I've looked for the applicable code but can't seem to find it.

Also, here is the command that I'm using (testing with full sha256) just in case there's something can be improved with that too.
hashcat32.exe --force --hex-charset -a 3 -m 1400 hash.txt "3CB8230A0000000000000000?H?H?H?H?H?H?H?H?H?H?H?H7C31" -O
(not getting much GPU acceleration for some reason) - about 6700 kH/s
I suspect I need to use binary chars for the hex input but "0x34 0x86 ..." etc. doesn't work correctly.

ssha help

$
0
0
Hi all

I need some help regarding choosing the right decoding option.
The hash looks like this:
{SSHA}_HAAAAEGXXXXXXXXXXXXXXXXXXXXh+b6BtQtOkonrbeI=

I have several users on this system, interestingly, the password hash for all users starts with _HAAAA, but then is different for the rest.
In the product documentation I found this nice little information:
The password is an LDAP-v3 level password (RFC2307). The encryption method is hashed. For more details on the Secure Hash Algorithm 1 (SHA1), see RFC3174.

In addition to hashing, the password encryption is “salted” with a base64 (64-bit) scheme. See RFC3112, section 3.2 for more details

From the IETF document https://www.ietf.org/rfc/rfc3112.txt I found this part:
      Given a user "joe" who's password is "mary" and a salt of "salt",
      the authInfo field would be the base64 encoding of "salt" and the
      authValue field would be the base64 encoding of the SHA1 digest of
      "marysalt".

So, based on what I read, I should be able to extract the salt with a reverse of the base64?
Would that even speed up the cracking process or doesn't it matter at all?
Which hashmode would I need to select? As there are many variants for ssha inside hashcat.
Thanks for help
pato

Build advice

$
0
0
Hi all, 

First time poster here and have really appreciate the community Hashcat have. I have been through the FAQ's and the loads of information available on both GitHub and the Hashcat forums but was hoping for a bit of specific advice on the current build I am looking at. 

What is the purpose of the build: Cracking my Ether Presale JSON Wallet (16300) with PBKDF2-HMAC-SHA256 encryption. I plan on using a combination of word lists and rules sets as I know the majority of the inputs for the password and as far as I understand from my research a brute-force would take centuries (if not longer). 
Subsequent to cracking my password - the use of the PC will be limited, however am ready to invest in the appropriate specs to crack my wallet but would like to limit costs where possible. 

I would be very appreciative for any advice/recommendations you could in terms of my proposed build below and whether I should focus more on GPU's than the CPU. From my research, the upside from GPU on PBKDF2-HMAC-SHA256 encryption is limited but please correct me if I have been misled.

Ideally, I would like to find the ideal cost/benefit of the specs below and if there is anything I am missing (i.e. additional fans/water cooling etc..)

Thanks in advance Smile 

Proposed build
Case: NZXT Source 340 Mid-Tower Gaming Case w/ USB 3.0, Side-Panel Window (Black Colour)

Extra Case Fans: Default Case Fan

CPU: AMD Ryzen 7 1700 3.0GHz [3.7GHz Turbo] Eight-Core 16MB L3 Cache 65W Processor

CPU Cooling: Cooler Master Seidon 240V High Performance Liquid Cooling system w/ 240mm Radiator *** Extreme OC *** (Cooler Master CPU Water Cooling *** Extreme OC ***)

Motherboard: MSI B350 Tomahawk AMD B350 Chipset, ATX Mainboard w/ 4 RAM slots, HD Audio, GbLAN, USB3.0, SATA-III /s, RAID, 1 x PCIe x16, 1 x PCIe x4, 2 x PCIe x1, 2 x PCI

Memory (RAM): 16GB (2x8GB) DDR4/2400mhz Dual Channel Memory (Adata XPG Z1 w/Heat Spreader)

Graphics Card (GPU): MSI AMD Radeon RX 570 4GB Armor Video Card (Single Card)

SLI BRIDGE: None

PSU (Power Supply): 500 Watts Power Supplies (Cooler Master MasterWatt Lite 500watt Gaming Power Supply)

PSU Braided Cable: NONE

M.2 SSD Drive: None

Internal PCI-E SSD Card: None

Hard Drive (HDD / SSHD / SSD): 1TB Seagate SATA-III 6.0Gb/s 7200RPM Hard Drive (Single Hard Drive)

forgotten password WhiteCoin (XWC)

$
0
0
please help i'm slouch in computer science so I ask for a very patient and calm person help me
to start with the beginning I downloaded
hashcat binaries v4.0.1 2017.11.07


I made a file.txt where I
the passwords that I think are correct and I do not know how


I have no idea how the dictionary should look like


or the order I have to put in cmd

f someone wants to help me privately on a social account because I have a lot of questions

.jpg   imagine.jpg (Size: 22.12 KB / Downloads: 1)

Trouble with veracrypt volume

$
0
0
I'm desperately trying to get back into a veracrypt volume I created that has all my cryptocurrency passwords in it. 

I'm new to this and I don't think I fully understand what I need to do. 

The veracrypt volume is a container file rather than a drive, and I know the password is composed of a limited number of "words"/components. so something like "sun7CRABforkBUM" I know all the possible components but not which order or how many, so it could be as little as 5 components or as many as 10, but only from a predefined list, with any word potentially capitalised or not

As far as I could tell, it was a combinator attack I needed to use, so I tried this:

hashcat64.exe -m 13721 -a 1 "s:\crypto" "S:\Downloads\hashcat-4.0.1\crypto.dict"


where "crypto" is the name of my veracrypt volume and "crypto.dict" is a list of all possible password components. 

When I try and run this command I get the usage example prompt. If I try with mode 0 then it says no hash file.

Can anyone tell me what I'm doing wrong here?

Ethereum Scrypt Hardware Opinion

$
0
0
Hello,

Long time lurker, first time poster here.
I've been using JtR and Hashcat for a while, but the current task is stumping me.

I have an Ethereum wallet, V3 scrypt 262144*8*1. The one which is impossible to get going with a gpu.
It is my only option to result to using CPUs.

I have three rigs that I used in the past for other hashes, but this one seems very slow.
Rig 1 AMDFX8320 8 core 3.5 - does 6 H/s
Rig 2 I7 6700k 4 core 4.0 ghz - does 15 H/s
Rig 3 I5 750 2.67 ghz - 4 H/s

I'm looking to maximize the hashrate per watt and $$
Which CPU can outperform the i76700k or possibly any other setup that is still not going to break the bank ?

Problem running with AMD CPU icd

$
0
0
Trying to run with AMD CPU icd for some test on my Ryzen 1700X. I get the following error:

Code:
./hashcat64.bin --opencl-platform=2 -b 
hashcat (v4.0.1) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

OpenCL Platform #1: NVIDIA Corporation, skipped or no OpenCL compatible devices found.

OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #1: AMD Ryzen 7 1700X Eight-Core Processor, 4012/16048 MB allocatable, 16MCU

Benchmark relevant options:
===========================
* --opencl-platforms=2
* --optimized-kernel-enable

Hashmode: 900 - MD4

clBuildProgram(): CL_BUILD_PROGRAM_FAILURE

error: unknown argument: '--no_warnings'
In file included from /root/hashcat-4.0.1/OpenCL/OCL20278T1.cl:12:
/root/hashcat-4.0.1/OpenCL/inc_common.cl:6:16: warning: 'extern' variable has an initializer
__constant u32 c_append_helper[64][16] =
               ^

error: Clang front-end compilation failed!
Frontend phase failed compilation.

* Device #1: Kernel /root/hashcat-4.0.1/OpenCL/m00900_a3-optimized.cl build failed - proceeding without this device.

Started: Thu Jan 11 13:19:53 2018
Stopped: Thu Jan 11 13:19:53 2018

Any hint?

trouble with all Litecoin wallets

$
0
0
Greetings all.

I have an old Litecoin wallet (with very little in it) - I wanted to try to crack it as an exercise. First I tried patterns and masks that SHOULD have worked, but didn't. Eventually, in desperation, I switched to using a Dictionary that ONLY has the known correct password in it, and I still can't get hashcat to win with it.

I've made sure the hash is in the right format (from https://hashcat.net/wiki/doku.php?id=example_hashes) but hashcat fails to recognize the password. 

NOTE: I've used the same hash with btcrecovery.py and JohnTheRipper with success, so I believe the hash is valid. Here is the output of what I'm trying.

Code:
root@hostname:~/hashcat-4.0.1# ./hashcat64.bin -a 0 -m 11300 wallet.test.hash word
hashcat (v4.0.1) starting...

OpenCL Platform #1: Advanced Micro Devices, Inc.
================================================
* Device #1: Ellesmere, 3258/4082 MB allocatable, 32MCU
* Device #2: Ellesmere, 3258/4082 MB allocatable, 32MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP

Password length minimum: 0
Password length maximum: 256

Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 75c

Initialized device kernels and memory...* Device #1: ATTENTION! OpenCL kernel self-test failed.

Your device driver installation is probably broken.
See also: https://hashcat.net/faq/wrongdriver

* Device #2: ATTENTION! OpenCL kernel self-test failed.

Your device driver installation is probably broken.
See also: https://hashcat.net/faq/wrongdriver

Dictionary cache hit:
* Filename..: word
* Passwords.: 1
* Bytes.....: 10
* Keyspace..: 1

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.          

Session..........: hashcat                                
Status...........: Exhausted
Hash.Type........: Bitcoin/Litecoin wallet.dat
Hash.Target......: $bitcoin$96$8f5eeae78eccfd47e5somehashdetailsd25fe7e4...0d6b78
Time.Started.....: Thu Jan 11 12:49:48 2018 (6 secs)
Time.Estimated...: Thu Jan 11 12:49:54 2018 (0 secs)
Guess.Base.......: File (word)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:        0 H/s (1.49ms)
Speed.Dev.#2.....:        0 H/s (0.00ms)
Speed.Dev.#*.....:        0 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 0/1 (0.00%)
Candidates.#1....: $ACTUALPASSWORD -> $ACTUALPASSWORD
Candidates.#2....: [Copying]
HWMon.Dev.#1.....: Temp: 34c Fan: 44% Core: 588MHz Mem: 300MHz Bus:8
HWMon.Dev.#2.....: Temp: 43c Fan: 30% Core: 300MHz Mem:1750MHz Bus:8

Started: Thu Jan 11 12:48:38 2018
Stopped: Thu Jan 11 12:49:55 2018

Can anyone point me in the right direction? I'm stymied. Thanks!
Viewing all 8030 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>