Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8094 articles
Browse latest View live

13 gpu issue

$
0
0
Hi, i have few issues... im trying to solo benchmark cpu/card on 13 gpu machine on ethos... but when i use -D 12 it shows device not specified... when i use without D i see 12 Device is cpu...

also im trying to test some eth test wallet... to play with it but...

i run johntohashcat - and i see result:

$ethereum$s*262144*8*1*6a985472eb26c752c86b482b5bc2a91ad1dfe0ea05a78a22b80ddac47f623a84*23a27901b3b50a52e7bbcdeb2b4f8f61ecc849b18d4bdcf63334b62ce5194c76*2191f3c9efd1673f19e446fb1bb426d6025a1841a33fdc98088c76f9906371cc

(THIS IS EMPTY TEST WALLET)

so im trying ./hashcat $ethereum$s*262144*8*1*6a985472eb26c752c86b482b5bc2a91ad1dfe0ea05a78a22b80ddac47f623a84*23a27901b3b50a52e7bbcdeb2b4f8f61ecc849b18d4bdcf63334b62ce5194c76*2191f3c9efd1673f19e446fb1bb426d6025a1841a33fdc98088c76f9906371cc


but i see:

Hash '*262144*8*1*6a985472eb26c752c86b482b5bc2a91ad1dfe0ea05a78a22b80ddac47f623a84*23a27901b3b50a52e7bbcdeb2b4f8f61ecc849b18d4bdcf63334b62ce5194c76*2191f3c9efd1673f19e446fb1bb426d6025a1841a33fdc98088c76f9906371cc': Line-length exception

No hashes loaded.

any advice?

im new with hashcat... Smile

p.s. maybe my gitclone and make / make install goes wrong ?

ethereum v3 scrypt - 12 gb ram gpu will solve problem?

$
0
0
I wonder anyone have msi gtx 12 gb titan and already tested with scrypt ethereum v3 json wallet?

12 gb ram will be enough ? how fast 1 card is?

VeraCrypt Volume Won't Decrypt. I know password and keyfile?

$
0
0
Long story short, for some reason the password and keyfile that I always used to decrypt my drive will not work. I have dug around the forums here and I do not understand how I would go about using hashcat to "recover" my password. I'm running Windows 10.

Old Office and KDF

$
0
0
Hello,

I am trying to crack an old-office hash following the steps given at https://hashcat.net/forum/thread-3665-post-20935.html#pid20935 :

Thanks to mode 9710 I found : 'deebd8f416' as output.

Quote:Append 4 byte zeros to result
-> deebd8f41600000000
Quote:MD5 the 9 bytes
md5("deebd8f41600000000") = CF205B696DC9CB05FB008C2B90BFD2AC

Then I'm lost :
Quote:Use 16 byte result as 128 bit RC4 Key
Decrypt encryptedVerifier with RC4 to decryptedVerifier
Decrypt encryptedVerifierHash with RC4 to decryptedVerifierHash
MD5 the decrypted encryptedVerifier
Compare 16 byte result with decrypted encryptedVerifierHash

Could you please provide deeper explanation ?

Can I restore old header keys for logical volume using dd command? (Veracrypt)

$
0
0
I've been trying to crack Veracrypt password for logical volume (full disk encryption) using hashcat, but with no success. My wordlists don't fit, but definitely I do everything correctly because I've cracked hash with old password from old rescue disk.
My question is: if I use dd command on linux to overwrite hash on disk using hash file from old rescue disk, will I be able to use old password? I've read it's possible to restore old headers for all kinds of encrypted volumes except logical volume (when trying to restore, old rescue disk says "Invalid parameter"). 
I mean, is restoring old header for logical volume from old rescue disk just blocked to prevent doing so from rescue disk, or it's blocked because old header won't work anyway?
If won't work, could you please explain me why?

New

$
0
0
I am new to the process of all this. I am simply looking for some help to navigate this program. I am trying to learn more about computer but cracking passwords is something i have no clue about. I am not using this program to do illegal things or break into someones computers. I'm simply using it to get into old hard drives i find so i can go in and delete everything so i can use them. If there is someone who could please help me it would be much appreciated please feel free to email me. Thank you

"Getting Help from Friends" -- Reverse my hash?

$
0
0
Hey all, I've got a few friends who want to volunteer their GPU's for cracking.

If I just send them my output hash for an Ethereum wallet, for example -- can they reverse my wallet file?

They'll end up with the password, but not necessarily the wallet file to open the account. Of course they'll need the output hash for the wallet, but can they now have both and bypass me?

pbkdf2 php

$
0
0
I don't know which hash mode i should use,  seems it uses the php function hash_pbkdf2.
Here is my php code...
PHP Code:
public function hash_password($password)
{
return 
base64_encode(hash_pbkdf2('sha256'$password, \Config::get('auth.salt'), \Config::get('auth.iterations',10000), 32true));


using hashcat to generate file-checksums

$
0
0
it's not the intended purpose of hashcat, but can it (or any of its tools) be used to generate checksums of files, leveraging gpu? Preferably sha256 or higher.

My guess is no, but I'd love to be wrong on this one.

I didn't find the answer on the forums, wiki or faq, nor when trying the software itself.
I am looking for accelerating this process, and disk-IO doesn't seem to be the bottleneck.

Thanks for any input

Is correct these hash?

$
0
0
Hi,

I'm trying to extract user and pass of a application for try to convince my boss to use https instead http. The application have a form that login with http server.
I'm  trying to sniff traffic and capture data with wireshark to get user/pass authentication:

I see these in wireshark:

Code:
[1,"UserSession:IDL_Register",1,0,{"1":{"str":"david"},"2":{"str":"|GSR|WIN-56DQT3UEU2J|3740|1516566386|ChallengeSIDStr|2:5D2F8D5A0E07E4C3C4E97990E5CE2A7C452DEEDDA43D52BF99AD9F47735FC4D675A3F62FF4FC028679BC06E78EA1B34F91DF9C5214F4F9C60E6E4124FXXXXXXX"},"3":{"str":"CLIENTE"},"4":{"str":"user"},"5":{"str":"GUI"},"6":{"str":"9.0.18.000"},"7":{"i64":600}}]HTTP/1.1 200 OK


Since the user I login is david (I know also the password), I understand than the code 5D2F8..... is the hash password.  I've used hashid and it says me:

Code:
Possible Hashs:
[+]  SHA-512
[+]  Whirlpool

So I use hashcat but I can't get nothing:


Code:
C:\Users\pc\Downloads\hashcat-4.0.1\hashcat-4.0.1>hashcat64.exe -m 1700 -a 0 --opencl-device-types 1,2 5D2F8D5A0E07E4C3C4E97990E5CE2A7C452DEEDDA43D52BF99AD9F47735FC4D675A3F62FF4FC028679BC06E78EA1B34F91DF9C5214F4F9C60E6E4124FXXXXXXXX
hashcat (v4.0.1) starting...

* Device #1: Intel's OpenCL runtime (GPU only) is currently broken.
             We are waiting for updated OpenCL drivers from Intel.
             You can use --force to override, but do not report related errors.
* Device #3: WARNING! Kernel exec timeout is not disabled.
             This may cause "CL_OUT_OF_RESOURCES" or related errors.
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch
nvmlDeviceGetFanSpeed(): Not Supported

OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 530, skipped.
* Device #2: Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz, 4060/16242 MB allocatable, 8MCU

OpenCL Platform #2: NVIDIA Corporation
======================================
* Device #3: GeForce GTX 950M, 1024/4096 MB allocatable, 5MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
* Uses-64-Bit

Password length minimum: 0
Password length maximum: 256

ATTENTION! Pure (unoptimized) OpenCL kernels selected.
This enables cracking passwords and salts > length 32 but for the price of drastical reduced performance.
If you want to switch to optimized OpenCL kernels, append -O to your commandline.

Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger disabled.

Starting attack in stdin mode...

Session..........: hashcat
Status...........: Running
Hash.Type........: SHA-512
Hash.Target......: 5d2f8d5a0e07e4c3c4e97990e5ce2a7c452deedda43d52bf99a...XXXXXX
Time.Started.....: Sun Jan 21 22:01:55 2018 (10 secs)
Time.Estimated...: Sun Jan 21 22:02:05 2018 (0 secs)
Guess.Base.......: Pipe
Speed.Dev.#2.....:        0 H/s (0.00ms)
Speed.Dev.#3.....:        0 H/s (0.00ms)
Speed.Dev.#*.....:        0 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0
Rejected.........: 0
Restore.Point....: 0
Candidates.#2....: [Copying]
Candidates.#3....: [Copying]
HWMon.Dev.#2.....: N/A
HWMon.Dev.#3.....: Temp: 54c Util:  0% Core: 993MHz Mem:1001MHz Bus:16

NvAPI_GPU_GetPerfPoliciesInfo(): NVAPI_ERROR

NvAPI_GPU_GetPerfPoliciesStatus(): NVAPI_ERROR

Could you help me please? I'm trying to understand but I'm newbie and is difficult to me. Many thanks and sorry for my English!

I can't found cyrillic password for MS Office, Rar

$
0
0
I can't found cyrilic password for MS Office, Rar..
For example, I have Rar document with cyrillic password 'ю' (ISO 8859-5:  044e )

I tried to run:

hashcat64 -m 12500 -a 3 $RAR3$*0*xxxxxxxxxxxxxxxx*xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ?b

hashcat64 -m 12500 -a 3 $RAR3$*0*xxxxxxxxxxxxxxxx*xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ?b?b

hashcat64 -m 12500 -a 3 $RAR3$*0*xxxxxxxxxxxxxxxx*xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ?b?b?b?b

The password could not be found.
For the Latin alphabet hashcat finds the password successfully



The same problem for MS Office and WinZip.
Previously, I tried to raise this problem in the forum, but I did not solve the problem ((

Combinator Attac

$
0
0
Hi,
i would like to test a rar3 hash and i have the fragments of my password.

I would like to concatenate every combination from the dictionary.

As i have seen that out of 26 lines it combinates extreme low combinations..

I expect to have even more.

From this man : https://hashcat.net/wiki/doku.php?id=combinator_attack i took for dict1 and dict2 the same file, but no effect.

How to generate hashes for directory content (files) not crack them ?

$
0
0
Hi !

I see hashcat is the one of rare tools using GPU horsepower to speedup cracking passwords but my intention is a bit different. I'm searching for tool that can use GPUs but for hash generation (SHA-256 - has type 1400 by https://hashcat.net/wiki/doku.php?id=example_hashes) not password cracking.

My use case would be scan a ton of archive files and compare the duplicates much faster using GPUs than CPUs.
Current benchmarking proves a i7 type CPU can't saturate more that 1-2GBit/s bandwidth on this task on any type of files (even 100GB each running parallel 16 threads) but testing hashcat on my Dell XPS 15 laptop with a week GT 750M is already 25% faster than the CPU and me having a local and network storage that is ~ 1GB/s (8Gbit/s) capable I would use the GPUs for the task as that would limit the need for so many workstations to do the work. 

Looking at the docs and features I see hashcat is capable of multitasking and even multi node setups but what it would take to add this mode to the feature set in near future ?

Thanks !
Best regards,

5LTC for help!

$
0
0
Hello,
so I have the same problem the most have... Lost ltc wallet password. Already tried millions and millions combinations of some words and digits that I used to know... I used brute force with btcrecovery. So thought maybe you guys can help me and ofcourse not for free. 5ltc would be yours. I have some thoughts about what pass might be, but I already told that I tried millions of differents combo's. 
No .dat will be shared, you share your opinion and I trying to used it and if it works i will send you 5ltc's most def.
No need no bullshit comments thank you.

Hashtopussy vs Linux Beowulf


Low CPU Utilization - OpenCL

$
0
0
I'm running OpenCL across my Intel i9 CPU and dual GPU cards.  GPU cards are running at expected 50'ish MH/s, however, the CPU is running very slow around 4 MH/s with standard descrypt.  I've removed, reinstalled, and made sure all drivers are up to date.  I can't figure out why the CPU isn't running at the expected 45-50 MH/s.

Thoughts?

Rules help with doubling and shifting.

$
0
0
I have studdied the rules. I think I understand them. But I want to know if a couple things are possible. 

Is it possible to shift a dictionary like on John? E.g. Crack96 > cRACK(^

Also is it possible to double a password and shift it? E.g. Crack96 > Crack96cRACK(^

Cost of Hashstack

$
0
0
How much does it cost per month/year to run with or without software?

GPU not getting close to benchmark?

$
0
0
I have a GTX 960 and when i run benchmarks it gets around 12000 MH/s but when i actually use it with a dictionary and rules, i get around 1000 MH/s MAX am I doing something wrong? I tried the -O option.

I was using the dive.rule file and getting 1gh/s
i tried the d3ad0ne.rule and got 1.5gh/s

http://www.fitwaypoint.com/pink-diamond-skin-care/

$
0
0
Pink Diamond Skin Care is highly recommended by me. I don't use a lot of top hands doing it but when I do, watch out. Nothing I have done with the opportunity has worked. You have to have understood what the solution was, but your Pink Diamond Skin Care makes or breaks you. Permit me go over this in exact detail. That theory may reverse your fortune. My Grandma used to tell to me how they presumed it was best to stay with 
this instrument. Give that a rest, why don't you? I'm only just saying that I will be speaking from experience and I will leave that at that. Doing this tells me that I have a lot to learn. Whenever ladies experience that, it is recommended that they do not hesitate to consult a professional. Most North Americans have not used that more than once due to this. It seemed as if I couldn't do anything right. I surmise that you are worrying about the most pressing facts you need when it comes to using this. This is a flaccid easy way for making do with that choice. I've been experimenting a lot with Pink Diamond Skin Care recently. 

http://www.fitwaypoint.com/pink-diamond-skin-care/
https://pinkdiamondskincarefact.tumblr.c...onsbuy-now
Viewing all 8094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>