Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8094 articles
Browse latest View live

Call custom algorithm form hashcat

$
0
0
Hi,

I have string which was encrypted using combine of few algorithm (not standart MD5 or else) implemented on C# using .Net libraries.
Is there way to call this algorithm from hashcat?
For example, I'll create some assembly with public method and specific input/output parameters to check if password acceptable for encrypted string or not?
Is there some documentation or examples implemented?

Thanks!

PS. Sorry if it's stupid question, I'm new in this.

Am i wasting my time?

$
0
0
Hello wondering if somebody can help with my situation.
I captured the handshake of my network and converted it straight to hccapx using this site without cleaning the cap file, just wondering if i am still able to crack the hccap or do you HAVE to clean the cap before converting to hccapx as i've been running hashcat for 2 days now on the hccapx. 
Would be really grateful if somebody could answer this for me, thanks.

Help with mask

$
0
0
Hi,

I'm trying to crack a 7z password. I have the hash and have a started a brute force, but as i'm fairly sure what teh make up of the password is I thought a mask would be easier (currently estimated 124 years!!!!).

Could someone help me out?

What I know:
  1. It contains a static 5 letter word. I know what the word is but for the example lets say its 'boats'
  2. Any letter can be uppercase or lower case i.e Boats / BoAts / bOATS
  3. It can have up to 4 numbers before and/or after and im failry certain they are either 1 or 0 ie. 0101boats / 0101boats0101 / 01boats01 / boats01
  4. It may or may not have an '!' mark at the end ie. boats01!

This it the code I'm running at the moment
C:\hashcat1>Hashcat64.exe -a 3 -m 11600 hash.txt

I have the beta installed 4.1.1-2
Windows 10

Thanks

New hashcat freezes or very slow

$
0
0
Updated Hashcat to v4.1.0-3-g63defd1c and it started freezing my computer or running slow.

Using usual command, i.e. hashcat -m 2500 -a 0 -w 3 example.hccapx dictionary.txt it then either freezes computer or running incredibly slow at 10 h/s.

I have Ryzen 1800x + 2x GTX970, Ubuntu 17.10. Only just started after update latest hashcat version. Previously on hashcat --version it returned pull/1273/head.

Please advice how to pull back to previous version or fix the problem on the new version.

Hashcat does not seen password in the dictionarry

$
0
0
Hi everyone. I am cracking captured handshake from WPA/WPA2. Issue Is I did crack this ssid once and get password "Alwayshigh". 
When I tried crack others handshakes I could not get anything. I tried my old handshake with known password and hashcat could not find this password second time. It just moves on. I created new dictionary with few words and with known password still same result. If anyone know how to avoid it please help me.
Tried reboot PC. 
did "apt-get upgarde hashcat"
It installed 77 updates. Question is why it use to work once and doesn't matter what I am doing now it just not seen this word in the dictionary.

root@kaliHome:~# hashcat -a 0 -m 2500 hs/Hash/zeus.hccapx passLists/ud.txt
hashcat (pull/1273/head) starting...

* Device #1: WARNING! Kernel exec timeout is not disabled.
             This may cause "CL_OUT_OF_RESOURCES" or related errors.
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch
* Device #2: Not a native Intel OpenCL runtime. Expect massive speed loss.
             You can use --force to override, but do not report related errors.
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1050 Ti, 1009/4038 MB allocatable, 6MCU

OpenCL Platform #2: The pocl project
====================================
* Device #2: pthread-Intel(R) Celeron(R) CPU G3900 @ 2.80GHz, skipped.

Hashes: 10 digests; 6 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Salt
* Slow-Hash-SIMD

Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger disabled.

INFO: Removed 5 hashes found in potfile.

* Device #1: build_opts '-I /usr/share/hashcat/OpenCL -D VENDOR_ID=32 -D CUDA_ARCH=601 -D VECT_SIZE=1 -D DEVICE_TYPE=4 -D DGST_R0=0 -D DGST_R1=1 -D DGST_R2=2 -D DGST_R3=3 -D DGST_ELEM=4 -D KERN_TYPE=2500 -D _unroll -cl-std=CL1.2'
Dictionary cache hit:
* Filename..: passLists/ud.txt
* Passwords.: 510253
* Bytes.....: 5711554
* Keyspace..: 510253

- Device #1: autotuned kernel-accel to 44                 
- Device #1: autotuned kernel-loops to 46
[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit => [s]tatus [p]ause [r]esApproaching final keyspace - workload adjusted.           

                                                          
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: hs/Hash/zeus.hccapx
Time.Started.....: Sun Mar  4 03:43:08 2018 (5 secs)
Time.Estimated...: Sun Mar  4 03:43:13 2018 (0 secs)
Guess.Base.......: File (passLists/ud.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:    99962 H/s (4.23ms)
Recovered........: 5/6 (83.33%) Digests, 0/1 (0.00%) Salts
Progress.........: 510253/510253 (100.00%)
Rejected.........: 0/510253 (0.00%)
Restore.Point....: 510253/510253 (100.00%)
Candidates.#1....: autogrammatica -> pseudoultrapseudoantidisestablishmentarianisticalities
HWMon.Dev.#1.....: Temp: 41c Fan: 46% Util: 82% Core:1898MHz Mem:3504MHz Bus:16

Started: Sun Mar  4 03:43:05 2018
Stopped: Sun Mar  4 03:43:14 2018
root@kaliHome:~# 

I used ud.txt wordlist and put first word is my known password. 
Thanks in advance

Scrypt / multibit classic

Blank Hash (31d6cfe0d16ae931b73c59d7e0c089c0)

$
0
0
I am dumping NTDS directly from a 2012 domain controller 


I am seeing the following hash over 50 times 31d6cfe0d16ae931b73c59d7e0c089c0.  The full hash count is a couple thousand, but I wondering why this hash (blank) is showing up and if anyone else has had a similar experience.

Advantage with a big wordlist?

$
0
0
Would I be at an advantage to take the several dozen wordlists available online, combine them together and remove duplicates and whitespaces, etc... Looks like the resulting dictionary file would be close to 200gb.

Do I understand .pot file correctly?

$
0
0
When I run an attack on a large block of hashes, does each successful crack embed the hash and the password in the pot file so that the next time I run an attack on a different data set, the pot file is queried for each hash to determine if it's already been cracked (assuming same hash algorithm of course)? So the longer I use hashcat, the more the pot file learns? Seems like there could be a fairly large pot file assembled for download to skip a bunch of cracking - much like the sharing of dictionary files. Thanks.

PDF different HASH outputs

$
0
0
So I have a PDF file ,  extract the hash using JOHN2PDF.PY

and get the follwoing output:-

$pdf$1*2**4294963412*1*16*1fb2832cb7bb5a0e00cdf68425c3891a*28*866f90a6539e6dbaa9a1dc8bfeb729f047fed059e1430e993a9d3528*32*866f90a6539e6dbaa9a1dc8bfeb729f047fed059e1430e993a9d352829c440b6

But then use another JOHN2PDF.PL and get a different output 

$pdf$1*2*40*4294963412*1*16*1fb2832cb7bb5a0e00cdf68425c3891a*32*17631e7cf4af9f9e87e3dee76d0b24f6d6ee9fef6e6ecd71cca2a4ec02ed74bb*14*866f90a6539e6dbaa9a1dc8bfeb7

So i tried the online extracter at http://www.hash-c.co.uk and get the above too.


Both hashes will not work with lastest version of hashcat on mode 10400 , 10500 or 10600 ?

I get line length or salt length errors.

Any idea's?

1st time simple hash cracking setup

$
0
0
Core i3-7100 2-Core 3.9GHz, Radeon R9 270X, 8GB Gaming PC


Would the above setup be ok for a 1st time password cracker...


I dont need to worry about power consumption...


and whats the best gpu i could put into a i3 pc.



Im looking to not spend over £200 GBP on a small setup.

and from the above I expect about 
150 kh/s  = 
572 400 000 an hour =
13 737 600 000 a day

which seems plenty fast enough for an 8 digit password All Caps at least


Thats gotta be better than my 268 h/s 

lol


also.. 
any ideas for a small rig for under 200 quid.

cheers.

Hello everyone!

GTX 960 or GTX 1050

$
0
0
Hello. I will buy a new Card. In my country the GTX 960 and the GTX 1050 have the same price (maybe because the 960 is like a 1050ti in games?).. 
Anyway.. the 960 have 1024 Cuda Cores and the 1050 have 640 Cuda Cores, but I read that the Compute Capability for the 960 is 5.2 and for the 1050 is 6.1. So, Which card is best for hashcat???
Cheers

http://www.healthmegamart.com/xflo-male-enhancement/

$
0
0
Xflo Male Enhancement Rock Challenging I happen to be telling you right here considerably with the guinea pig for your male improvement power ability dietary supplements just lately, partly. "Quite a few Males who worry about the scale of their penis commonly have In general overall body picture troubles," he says. Border officials in southern Ontario seized close to 1000 packages of male improvement tablets concealed within a van in a border crossing last thirty day period.
http://www.healthmegamart.com/xflo-male-enhancement/  http://www.healthmegamart.com/Xflo Male Enhancement/

Bcrypt Blowfish Unix Hash

$
0
0
I am tying to decrypt a Hash which is bcrypt blowfish (Unix). The hash is like this  $2a$04$xxxxxxxxxx.
I already know the hash is a 6 digit numerical code.
As I know its going to be a 6-digit numerical code so I used a brute force with mask and it tried all the possible combinations in aorund 10 minutes and the hash could not be cracked. 
Here is the command line I am using: 
./hashcat -m 3200 -a 3 -1 ?d hash ?1?1?1?1?1?1

Note: I am using it on Mac OS and I tried another md5 hash which was also a 6-digit numerical code and was cracked with the same attack in less than a second

Now the question is why I am unable to crack the bcrypt hash with brute force mask attack? Am I missing something? Or I need to use some other way?

13 2100 dual core - probly a 1050ti

$
0
0
GeForce GTX 1050 into play for hashing... into a i3 2100 dual core 

Would anybody advise me against this . And if so what are the pro's / cons

I expect power consumption to be mentioned....

But iv also heard that any graphics card would work with the i3..

Any advice would be of use, thank you.

Trying to install hashcat on Windows 7 with AMD help

$
0
0
I have installed:
AMD driver for my 5770, it's listed version under Windows 7 Device Manager says "15.3"
OpenCL for Intel Core and Xeon processors

"No Device Found/Left" is the error I get whenever I use an option that forces GPU

-I option gives me a list of platforms: platform 1 is "Advanced Micro Devices etc" Device 1 is Xeon 3470 (What??)
Platform 2 is "Intel etc." Device 1 is Xeon 3470

I've been having this "No Device Found/Left" error since I started trying to run Hashcat on Windows 7 with the proper video driver.
There must be something missing, something not listed in the documentation. Does Catalyst Software Suite need to be install as well? What about AMD OpenCL 2.0 driver for Windows 8.1??

I don't understand, at all. I may be retarded, I do have ADHD, but I can usually figure out what's wrong in these situations. 
May be related: when trying to update my driver using AMD's installer it told me it couldn't find any ATI devices. I installed the driver, instead, through Device Manager allow windows to find the proper driver by directing it to the driver files location.

Very old TC volume...

$
0
0
I was recently going through some old files I had backed up on some ancient external hard drives from 2004/5. On one of them I found an old True Crypt volume. For the life of me I cannot remember the password or what it would have even remotely been. Is there any hope here? It's a 1GB volume and I'm really curious to see what I had in it.

Electrum salt ver 4?

Increasing single-block device memory allocatable for --scrypt-tmto 1 / clCreateBuffe

$
0
0
Increasing single-block device memory allocatable for --scrypt-tmto 1.
Increasing single-block device memory allocatable for --scrypt-tmto 1.
clCreateBuffer(): CL_OUT_OF_HOST_MEMORY

it's okay, but there are problems when starting up, when enabled -D1 everything was fine, decided -D1,2 and started to throw this error, after the back -D1 error remained, preload does not help / CPU i7 3770 RAM 16gb

hashcat64.exe -1 ?l?u -a3 -D1 -m15700 $ethereum$s*262144*8*1*ff3ce6cd147186e..13306acbef8be8b0a1f45..14dc4e7b514df58f385d030a*b6c9e8f85085207a..813032bf1447faf24521434290..ba8fa48f0ded3663ff*7646c81e80e..6d8049a67607b8f11b89cb0e2f020d6b8da7852c..5ec9420ff ?1rypto?h?h?h?h --status --status-timer=5 -w3 --force
hashcat (v4.1.0) starting...

OpenCL Platform #1: Advanced Micro Devices, Inc.
================================================
* Device #1: Ellesmere, skipped.
* Device #2: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz, 4086/16344 MB allocatable, 8MCU

OpenCL Platform #2: Intel(R) Corporation
========================================
* Device #3: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz, 4086/16344 MB allocatable, 8MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Watchdog: Temperature abort trigger set to 90c

Increasing single-block device memory allocatable for --scrypt-tmto 1.
Increasing single-block device memory allocatable for --scrypt-tmto 1.
clCreateBuffer(): CL_OUT_OF_HOST_MEMORY

Started: Sun Mar 11 22:31:24 2018
Stopped: Sun Mar 11 22:31:28 2018
Viewing all 8094 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>