Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8095 articles
Browse latest View live

Truecrypt 4.3 Volume

$
0
0
Hi, I need help cracking a Truecrypt volume created using version 4.3, I suspect the hash used is SHA-1 as I have tried all the other available hash modes (62**) to no avail. Is there a mode that I can use to crack it?

Thanks in advance!

Ryzen (OpenCL) with Hashcat

$
0
0
Just a quick one, why doesn't my 1800x show up when called for with -D 1

hashcat64.exe -I only lists my Nvidia GPU's w/ Win10

mask digits increment

$
0
0
hello everyone!

I have hash & I know almost a first half of source string and second half is 16 random digits:

PHP Code:
MD5("Workgroup.U1."+16digits// (0000 0000 0000 0000 - 9999 9999 9999 9999) 

this is correct command?
Code:
./hashcat64.bin -m 0 -a 3 hash Workgroup.U1.?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d 

I'm not a hacker and when i read about numbers like 10 quadrillion..oO I feel so confused about it is real or it takes all my lifetime? 
Am I need to buy amazon gpu servers and ~how much it cost?

Hashcat Usage

$
0
0
I created a veracrypt standard encrypted container , and put all my photos in them. 
After a month or so Iam unable to open my container , also i have saved the password it doesnt seem to open
I remember the original one differeing from saved one by small bit, Iam trying to run hashcat and Iam unable to do so,
Iam strck at extracting hash for my container I previously used The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) for wpa2 hacking and thats it. Iam willing to learn and understand anything that user would like me to learn before this , iam actually sitting before computer for 3 days , i tried and searched all the threads but i dont seem to understand , If any person can kindly help me and get back my pictures it would mean life to me thank you soo much , Iam trying to use it hashcat on windows ,also put latest The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) on download . may be that could help, i know for a great certanity or closeby the password i put Sad but i wont let me in,

Does TrueCrack work for veracrypt dictionary attack

Hashcat pid/outfiles error

$
0
0
Hi,

I'm using hashcat-4.0.1 in windows10.


i'm trying to brute force attack wpa2, but i always get same error :


Code:
hashcat-4.0.1>hashcat64.exe -a 3 -w 3 -m 2500 crack.hccapx ?d?d?d?d?d?d?d?d?d
hashcat (v4.0.1) starting...

hashcat-4.0.1/hashcat.pid: No such file or directory

hashcat-4.0.1/hashcat.outfiles: No such file or directory

Started: Thu Feb 08 10:55:29 2018
Stopped: Thu Feb 08 10:55:29 2018

I also tried  :
  1. hashcat64.exe -m 2500 -w 3 crack.hccapx rockyou.txt
  2. hashcat64.exe -a 3 -w 3 -m 2500 crack.hccapx  -1 abcdefg123456789 ?1?1?1?1?1?1?1?1?1
  3. Running a file "\hashcat-4.0.1\example0.cmd" 
  4. Using older version of hashcat 
  5. Starting cmd as administrator
  6. Giving hashcat administrator privileges
  7. Installing nvidia latest drivers (390.77)
Everything i try , outputs the same error :

Code:
hashcat (v4.0.1) starting...

hashcat-4.0.1/hashcat.pid: No such file or directory

hashcat-4.0.1/hashcat.outfiles: No such file or directory

Started: Thu Feb 08 10:55:29 2018
Stopped: Thu Feb 08 10:55:29 2018


My Computer Details: 
windows 10 64bit
GPU : GTX 1060
CPU : i5-3470
RAM : 8G 


Thank you for your reply!

Karbo (karbovanec) wallet bruteforce

$
0
0
Hello!
I fogot my passwor of Karbo coin wallet
I now what my version 0.2.2 of wallet use chacha algo for crypting wallet
Can I extract hash and try to brute thru my own password dictionares ?

Thank you!

12 GPU hashcat rig

$
0
0
Has anyone seen this?  It has been created for the mining community.  It seems to be that it could also serve the hashcat community.

https://www.pcgamer.com/you-can-cram-a-dozen-graphics-cards-into-this-motherboard/
12 GPU motherboard

What is the current conventional wisdom regarding the use of risers these days with hashcat?  I seem to remember reading in these forums a couple years ago that using risers with GPUs for use with hashcat wasn't optimal or recommended.

(Nevermind that the GPU market is in a shambles right now.)

Help to understand encrypted table

$
0
0
Anyone can help to understand data in the attached file or refer to other forum where could help? I'm 99% sure it is a table  with numbers as values  including header.

.txt   encrypted_table.txt (Size: 5.24 KB / Downloads: 14)

Itunes

$
0
0
Hi everybody,

I'm new on this forum.
I extracted an hash code about itunes encrypted backup from the manifest.plist using a product.
The Itunes version is 10.x.
Can you explain to me now the exact syntax to try to decrypt the hascode by brute-force ?
Thanks a lot for your help.
regards.
Jean-Louis

Cracking a CHAP from Freeradius

$
0
0
Hi there

Playing around with a Freeradius installation and trying to extract the plaintext password from the CHAP challenge/response. How do I go about doing this?

Here is a successful login [Freeradius log]

Code:
Service-Type = Login-User
      User-Name = "testing"
      CHAP-Challenge = 0x45c915d82d6725720xxxxxxxxxxxxxxxxx9048420a31292d3
      CHAP-Password = 0x00777f2a3f6a2e66xxxxxxxxxxxxxxx1947b520c6777e0b25



[chap] login attempt by "testing" with CHAP password                                  
[chap] Using clear text password "password" for user testing authentication.
[chap] chap user testing authenticated succesfully




Here is a failed login [Freeradius log]

Code:
      Service-Type = Login-User
      User-Name = "testing"
      CHAP-Challenge = 0xc8274xxxxxxxxxxxxx

+group CHAP {
[chap] login attempt by "testing" with CHAP password
[chap] Using clear text password "password" for user testing authentication.
[chap] Password check failed
++[chap] = reject




Additional info:

Code:
  
# Executing section authorize from file /etc/raddb/sites-enabled/default
+group authorize {
++[preprocess] = ok
[chap] Setting 'Auth-Type := CHAP'
++[chap] = ok
++[mschap] = noop
++[digest] = noop
[suffix] No '@' in User-Name = "testing", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] = noop
[eap] No EAP-Message, not doing EAP
++[eap] = noop
[files] users: Matched entry testing at line 1
++[files] = ok
++[expiration] = noop
++[logintime] = noop
[pap] WARNING: Auth-Type already set.  Not setting to PAP
++[pap] = noop
+} # group authorize = ok
Found Auth-Type = CHAP


How could I start cracking this:       CHAP-Password = 0x00777f2a3f6a2e661947b520c6777e0b25

Encfs

$
0
0
Hi
I use cryptkeeper (GUI) to use my encrypted "containers". My containers structure is something like:

.folder_encfs with some scrambled named subfolders/files. I have forgotten password but I think I know some words I used to encrypt.

May I use hashcap to crack this container?

I can not determine the number in the hashcat

$
0
0
Hi, I have a wallet Obsidian.
I pulled a hash from blockchain2john.py
Hash type $blockchain$81920$0000000001000000000000006231050009000000002000000009000.......
The rest did not write, but he does not define it.

Rules rules rules!

$
0
0
I've read as much as i dare regarding rules, and i'm not sure how i am to apply it to my usage scenario...

I think it's more than rules, it's more constructing the required command with the right files...

Say for instance, i have a password that i know HAS the following in it;

LAD
BYE

and MAY have the following in it, located at the start;

m@1d

And MAY contain these combos located anywhere

ABC
NET
KAL

- I'm having trouble understanding how to implement this into hashcats world...

Would anyone care to assist?

Mask attack help

$
0
0
I just started learning how to crack some handshakes this Friday, and with my limited knowledge, I've been able to reach somewhere. Unfortunately, I'm having problems with the mask attack.

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: capture.hccapx
Time.Started.....: Sat Feb 10 22:22:32 2018 (13 mins, 10 secs)
Time.Estimated...: Sat Feb 10 22:35:42 2018 (0 secs)
Guess.Mask.......: ?d?d?d?d?d?d?d?d [8]
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#2.....:   124.3 kH/s (2.40ms)
Recovered........: 0/2 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 100000000/100000000 (100.00%)
Rejected.........: 0/100000000 (0.00%)
Restore.Point....: 10000000/10000000 (100.00%)
Candidates.#2....: 60521739 -> 67646497
HWMon.Dev.#2.....: Temp: 82c Fan:100% Util: 80% Core:1683MHz Mem:3802MHz Bus:16

Started: Sat Feb 10 22:22:24 2018
Stopped: Sat Feb 10 22:35:44 2018

C:\Users\ice\Music\hashcat-4.0.1>pause

Based on my limited knowledge, I know that the password is in the range of 60521739 -> 67646497 from the information above.
If some can guide me on how to properly understand mask attacks to solve this I'll be grateful. Also, maybe my analysis may be wrong.

--stdout combinator attack

$
0
0
I'd like to use hashcat's blinding speed to generate password candidates from 2 dictionary files. When I say generate, I mean print out to stdout. I tried using the --stdout flag but i dont think this works with combinator? Am I wrong, or if im right, Could this be a new feature please?

Wierd Problem With Intel OpenCL (CPU) and Hashcat Options.

$
0
0
Hey

I had the common error message:

Code:
Not a native Intel OpenCL runtime. Expect massive speed loss.

You can use --force to override, but do not report related errors

for my intel CPU on a Debian based Linux distribution. So i uninstalled the "The pocl project" Cpu driver and installed the  "OpenCL™ 2.0 GPU/CPU driver package for Linux* (64-bit)" from here:
https://software.intel.com/en-us/article...cl-drivers

Because i couldn't use the Runtime installer (ubuntu,Red Hat only) i used a "install" way which i found in this post:
https://hashcat.net/forum/thread-6079.html

(it just copies the openCL files in the right directories):
Code:
$mkdir intel-opencl 
$ tar -C intel-opencl -Jxf intel-opencl-r3.1-BUILD_ID.x86_64.tar.xz 
$ tar -C intel-opencl -Jxf intel-opencl-devel-r3.1-BUILD_ID.x86_64.tar.xz 
$ tar -C intel-opencl -Jxf intel-opencl-cpu-r3.1-BUILD_ID.x86_64.tar.xz 
$ sudo cp -R intel-opencl/* / 
$ sudo ldconfig

Everything worked fine and Hashcat  recognized the driver. I checked it with:
Code:
Hashcat -I
Then i tried
Code:
Hashcat -b -D 1,2

and it worked too.

But after that, i tried to crack a hash with a simple brute force attack
and when i tried to check the status, i noticed that the buttons/Options don't work.
It just jumps in a new line,like the script failed or something like that.
I found a similar problem in this thread:

https://hashcat.net/forum/thread-6202.html

But he used Ubuntu and others couldn't recreate the problem..
I want to use my gpu and cpu  separately with Hashcat but its not possible at the moment.
My question is if someone have a idea how i can solve or find the reason for that problem.
I didn't saw any Errors so i couldn't find the problem...

A.Beater

rules file support in attack mode 3

$
0
0
I can use command like this to bruteforce hash

Code:
hashcat64.exe  -a 3 -m 0 ed2b1f468c5f915f3f1cf75d7068xxxx ?d?d?d?d?d?d?d?d
But how can I let the hashcat know that the first four ?d?d?d?d are the  same as the last four ?d?d?d?d (For example, password like: 12341234,23452345)

Is there anyone know how  to modify the hashcat source  to support new masks like: ?d?d?d?d -r d ,which means ?d?d?d?d?d?d?d?d but the first four ?d?d?d?d are always the same as the last four ?d?d?d?d.(It is something like a Rule-based Attack,but I want the rule to support bruteforce attack,attack mode 3) Is it easy or not? And which part of the code should we focus on?

hashing MS Office 2010 so slow

$
0
0
Dear all,

I am hashing MS Office 2010 excel file and Speed.Dev.#1.....: 1272 H/s.
When I hashing md5 is Speed.Dev.#1.....: 10472.2 kH/s

Is this correct speed of office hashing?
and how to speed up to hashing office document?

GPU is Intel Corporation HD Graphics 530 and commandline is
hashcat --force -a 3 -m 0 xxx.hash ?d?d?d?d?d?d?d?d?d?d?d

Thanks a lot!

Please help with mask for 128 bit pdf key

$
0
0
Hello,

I have a pdf file with the following hash: 
$pdf$2*3*128*-4*1*16*<hash removed by philsmd>

So i can determine that -m = 10500. But a question 1 is about the key.

Do i understand right that if the key has 128 bit, I need to use the mask for 16 bytes: ?b..?b[16]?

And question 2: i saw examples about cracking pdfs, some of them are using mask ?a..a? and some ?b...?. If we are looking not a password but key (which is in bytes) atacking bytes (?b) seems right and (?a) - not?

Hybrid Attack

$
0
0
Hello, everybody. the problem is that the Hybrid Attack works good in right side and do not works in left  side.

So what do you think about this problem?

Thank you!

$ ... -a 6 example.dict ?d?d?d?d  ------------------------works good
generates the following password candidates:

password0000
password0001

It also works on the opposite side!

The configuration:

$ ... -a 7 ?d?d?d?d example.dict -----------------------do not works
generates the following password candidates:

0000password
0001password

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.
Viewing all 8095 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>