Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8114 articles
Browse latest View live

"If you specify a custom charset, you must also specify a mask."

$
0
0
Hello everyone,

I've been having difficulty attacking my WPA2 hash with this line:

Code:
hashcat64.exe --status --outfile WPA_out.txt --outfile-format 2 -m 2500 --custom-charset1 0123456789qwertyuıopüasdfghjklşizxcvbnmçö./!+@#$%*():; --increment --increment-min=8 --increment-max=16 wpa.hccapx -a 3 ?1?1?1?1?1?1?1?1

...and getting this errror:

If you specify a custom charset, you must also specify a mask.

Any ideas as to what I'm doing wrong? Isn't the mask at the end in proper format? I searched online for similar questions people might've already asked but couldn't come up with anything.

INFO: I'm running Hashcat on a 64-bit Windows 10 machine. I have confirmed beforehand that both Hashcat is running when run with simpler options, and that my WPA2 handshake capture file contains a valid handshake.

I apologize in advance for taking anyone's time and polluting the forum if this is a rookie question.

Tesla P100 / HC 4.1.0 Benchmarks on Google Cloud

$
0
0
Tesla P100 / HC 4.1.0 Benchmarks on Google Cloud:

Using some of my $300 in trial credit on Google Cloud / Hashcat 4.1.0

Results Attached.

.txt   nvidia-smi.txt (Size: 1.98 KB / Downloads: 1)

.txt   hashcat-benchmark.txt (Size: 10.63 KB / Downloads: 3)

Separator Unmatched! Please help!

$
0
0
I am using The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux to get itunes-backup password ios 10.
I type:

hashcat -a 3 -m 14800 -d1 --force myhashfile.txt
 
But the error comes and says ($itunes_backup$*10*X7XX5XX2b3aXXbX73XXcc8f0XX4fXX63*X7XX5XX2b3aXXbX73XXcc8f0XX4fXX63): Separator unmatched.

Please help me if you know why!
Is this due to my graphics card? 
Please give a detailed explanation.

need help ( paid )

$
0
0
Hello, i got a 1TB veracrypt volume but i forgot the password, i read the tutorial on another thread on how to recover the hash however when i run the command this is what i get

C:\Users\Administrator\Downloads>dd.exe if=hashcat_ripemd160_AES_hidden.raw of=D:\file04 bs=1 skip=65536 count=512
rawwrite dd for windows version 0.6beta3.
Written by John Newbigin <jn@it.swin.edu.au>
This program is covered by terms of the GPL Version 2.

skip to 65536
0+0 records in
0+0 records out

C:\Users\Administrator\Downloads>

anyone that can help me? i'm willing to pay anyone who helps me to recover the hash in bitcoin
thank you.

What am I missing?

$
0
0
I have used hashcat quite a bit in the past, but it's been a while so I might be missing something simple.  

I am using hashcat 4.1.0.  I used fgdump to dump a list of hashes.  Just to get my feet wet again, I created a simple text file with the password that I know matches to a username.  For example sake let's say the password is password.

For some reason hashcat is not cracking the password using my password file.  Here is the syntax I am using.

hashcat64 -a 0 -m 1000 dumpfile.pwdump password.txt

It recognizes the hashes and my password file, but it won't crack it.  But when I use the following brute force syntax it cracks it:

hashcat64 -a 3 -m 1000 dumpfile.pwdump passwor?a

Any ideas?

appending numbers to combo attack

$
0
0
Hi! I want to crack a password in the format of word1+word2 +3 digit number.

I got hashcat up and running on my gaming PC and got it to do a combination attack with the 2 word lists using this code....

hashcat64.exe -m 2500 -a 1 test.hccapx word1.txt word2.txt

But I can't seem to get the 3 digits onto the end. I tried using the -k but all the rules it can use seem to change text or add a stationary digit, but I need it to cycle through 0-9 for all three digits on the end. I also tried making a wordlist in crunch of the 3 digits but I wasn't able to make hashcat use 3 wordlists in the combination attack. 

Is there a way to pipe in the last three digits? I really appreciate the help Smile

Hi guys

$
0
0
I am here in this forum to start learning and to contribute what i learn from this community. 
I hope that all of the mods and admin will accept me as their loyal user. 

A problem i faced while uploading a avatar.
  • The maximum dimensions for avatars are: 100x100 pixels.
  • The maximum file size for avatars is 10 KB.
I get the idea that avatars should be 100x100px but why the max file size not greater than 10KB?
This has to changed since most of time when you edit something of your own in Photoshop. Only a text and and simple background will come above 10KB 

[Image: vrryrc.JPG]

from the above picture as you can see i have inserted only the text and the background color but when i try to save it even in it's lowest size possible i still get this size 28.6 KB

[Image: okwnqb.JPG]

Conclusion and suggestion from my end would be to change the max size to 500 KB ( / above 100 ) and min size to 10 KB

MD5 With salt how to save only cracked hash with email etc

$
0
0
I want to output all the cracked hash and email with IP address.

For example i have this for cracking 

Code:
XXXXX cbecfde42ea890a56a236XXXXXXXXX o~?L^t8SXFN7}6Q"V=yYoU29x9i*-G XXXXXXmail@XXXX.com 218.XX.217.XXX

but after cracking this i want to output only the cracked hash with all the line for example
Code:
XXXXX mypassword XXXXXXmail@XXXX.com 218.XX.217.XXX

I don't want to output the uncracked hash or it's entire line

how can i achieve this.

7z password recovery

$
0
0
Hey guys, this is my first post on this forum. I've been reading up on how to use hashcat but I need some guidance, so I wanted to ask a couple of questions here relating 7zip files.

Recently I locked a 7zip file with bunch of pictures and videos, and sadly for the life of me I cannot remember the password. I tried using the tool from this thread: https://hashcat.net/forum/thread-4328.html ,but the issue I have is that the zip file 1.4gb and it exceeds the memory limit, so I can't retrieve the hash in order to use HashCat as described in the GitHub article.

The good thing is that I know that the password length is between 5 and 12 symbols and I do not have any spaces in it. I have used letters and numbers or possibly some special characters like a "$" or "!". Since I have a Nvidia 1080 I think brute-force would be able to do within reasonable time, when I narrow down the password length. There are definetly no Cyrillic or weird symbols so that can be excluded too.

Any help would be greatly appreciated.

Thank you in advance!

sense word mask attack (hashcat WPA/2)

$
0
0
I've tried a lot of mask for bruteforce attacks. My graphic card gets about 95K H/s for WPA/WPA2.  I'm not satisfied with -a 3 legacy results. We can guess password as sense word of some language. For some languages there are 2-3 repeating same letter. Sense word hasn't more than 3 same letter. I'm trying to making sense word with letter repeat.  How to apply hashcat mask with determined number of letter repeating? Does exist that option?  It will speed up whole procces.

How to output the uncracked hash while saving it

$
0
0
This question is rather very simple but i can't help myself so i would simply ask from my mentors.

For this example i am using https://www.md5hashgenerator.com/

Quote:Your Hash: 5f4dcc3b5aa765d61d8327deb882cf99
Your String: password

Your Hash: 482c811da5d5b4bc6d497ffa98491e38
Your String: password123

Now that i have 2 password in my list to crack i use this command 
hashcat64.exe -m 0 -a 0 -o cracked.txt C:\hash.txt C:\wordlist.txt --show

And lets assume that everything went well and it did cracked the first hash and the second one being not cracked. 
How do i export the one which is not cracked as well for example i wanted to output like this

5f4dcc3b5aa765d61d8327deb882cf99:password
[b]482c811da5d5b4bc6d497ffa98491e38[/b]

Hashcat error [cl_mem_object_allocation_failure]

$
0
0
Hello. I've been searching online for at least 2 hours, and cannot find any solution, not even a clue.

Every time I try to run hashcat, it return an error. Even when benchmarking, and reaches wpa/wpa2 returns an error an stops.

The line says exactly this:
clEnqueueNDRangeKernel(): CL_MEM_OBJECT_ALLOCATION_FAILURE

I'm currently running on Windows 10 x64, i7 7700k and a GTX 1050.

Any help would be really appreciated, I'm completely lost.

PBKDF2-HMAC-SHA1 format for WPA hex key

$
0
0
Hello together,
I try since about 3 hours to crack a 4096 WPA-DK.
I used this website to generate a testhash:
ASCII-ESSID: "Testnetwork" == salt
ASCII-PSK: "12345678"
HEX-WPA-Key: "bc971f814d7bd37f7502cc67408c4f2c5a06e1b3d48dc041e42b5478154df1a8"

I used the v1.00rc3 GUI with hashcat-4.1.0 (x64) to crack it but it won't work.
I don't know the expected input format, but I orientated myself on the example hashes and on this thread.
The example has  (used it as shown below) was cracked very fast with a wordlist so I got the following information:
Code:
sha1:1000:MzU4NTA4MzIzNzA1MDQ=:19ofiY+ahBXhvkDsp0j2ww==
hash_type:bit_size:salt(b64):hash(unknown format)

Based in this information I entered my own string in 2 formats:
Code:
Plain:
sha1:4096:Testnetwork:bc971f814d7bd37f7502cc67408c4f2c5a06e1b3d48dc041e42b5478154df1a8

hex key raw:
sha1:4096:VGVzdG5ldHdvcms=:bc971f814d7bd37f7502cc67408c4f2c5a06e1b3d48dc041e42b5478154df1a8
hex key in base64:
sha1:4096:VGVzdG5ldHdvcms=:YmM5NzFmODE0ZDdiZDM3Zjc1MDJjYzY3NDA4YzRmMmM1YTA2ZTFiM2Q0OGRjMDQxZTQyYjU0NzgxNTRkZjFhOA==

Aditionally based on this post I modified the salt (ESSID) with a ":" at the end. In the post the seperator for John the Ripper is "$".
Code:
Plain:
sha1:4096:Testnetwork::bc971f814d7bd37f7502cc67408c4f2c5a06e1b3d48dc041e42b5478154df1a8

hex key raw:
sha1:4096:VGVzdG5ldHdvcms6:bc971f814d7bd37f7502cc67408c4f2c5a06e1b3d48dc041e42b5478154df1a8
hex key in base64
sha1:4096:VGVzdG5ldHdvcms6:YmM5NzFmODE0ZDdiZDM3Zjc1MDJjYzY3NDA4YzRmMmM1YTA2ZTFiM2Q0OGRjMDQxZTQyYjU0NzgxNTRkZjFhOA==

I had now 4 variants and tried them with "12345678" in the wordlist with following arguments (also used for the example hash):
Code:
hashcat64.exe -a 0 --session=2018-04-18 -m 12000 -w 3 --status --status-timer=60 --potfile-disable --remove -p : --gpu-temp-disable -o "D:\Downloads\Temp\data\output.txt" --outfile-format=3 "C:\Users\ScriptKiddie\AppData\Local\Temp\tmp84FC.tmp" "D:\Downloads\Temp\data\wordlist.txt"


Can you tell me what I'm doing wrong?

Hashcat can't find password

$
0
0
Sorry to bother you all, but it's two days i'm working on hashcat and can't seem to make it work, so i registered to seek help.
i'm trying to crak a .rar password file, i got his MD5 hash with Hash Suite free's hash calculator and i used both hashcatGUI and the cmd to try and get the password with no results.
i decided then to make a .rar myself to test it and found that neither way of using hashcat finds the password.
the password on the test file is 5 characters long, all min; i used the command line: 
hashcat64.exe -a 3 -m 0 hash.txt ?l?l?l?l?l --increment -o cracked.txt -w 3

it stops after a couple seconds, no output is generated (or modified) and i don't get any warnings nor errors.
i am completely oblivious on what i am doing wrong.

thanks in advance.

Hashcat pipe doesn't crack (WPA/2)

$
0
0
I'm trying pipe maskprocessor output to hashcat. In most cases when I set -q 3 -r 4, -q 3 -r 3, -q 3 -r 5 , it makes exhausted status. There is cracked status only if I set 0 to both or other large number (30,50). I don't know why!
Everything works fine with only hashcat. Problem occurs throught maskprocessor.

Router's wpa2 password was "11123334" Did I apply -q and -r propery? Where is a problem? I'm very confused Sad


Code:
mp64 -q 3 -r 4 ?d?d?d?d?d?d?d?d | hashcat64 -m 2500 test.hccap

win 10 x64, hashcat( I've tried with a lot of versions), maskprocessor 0.73. Hashcat and maskprocessor extracted to same folder on C disk.

Hashcat & OpenCL... Why OpenCL?

$
0
0
This may sound basic, but I have questions I can't seem to find the answer to.

I keep seeing references to installing OpenCL to see additional benefits...

I currently run Ubuntu 16 with 4 Nvidia GTX 1080 ti cards.  The motherboard has spots for 2 more GPUs, but getting the 1080ti cards now is not easy.

I can't seem to  find the answer to "How does using OpenCL benefit me?"  What would I gain?  Would I be able to add other brand cards to the rig easily? Why is OpenCL recommended?

nVidia GTX 1080 Ti vs. PNY,EVGA,MSI,ASUS,etc

$
0
0
I have 4 Nvidia GTX 1080 Ti cards in my rig currently.
I have space for 2 more cards.

Should I hold out for finding actual Nvidia GTX 1080 Ti cards or do the other brands version run comparably well?

Using newline character as part of mask attack

$
0
0
I have a MD5 hash which is computed as follows.

hash = md5(username\npassword);

As you see there is a new line character (\n) between the username and password. I know the user name and trying to recover the password. Here is the hashcat syntax I am trying with a known username and known three character password without success. 

.\hashcat64 -a 3 -m 0 --hex-charset -1  0a hash.txt username?1?a?a?a -O

What am I doing wrong here?

Uncrackable changing LANMAN Hashes?

$
0
0
Hey Friends,
so, this isn't a HASHCAT issue even though at first i thought it was - because no LM hash out of the two last NTDS.dit files we opened has cracked.

however, after when we used both DCSync and a GUI software we saw that the SAME password (with the same NTLM hash) had a different LANMAN hash, can anyone explain to me how that happens? and if that makes the LM password Uncrackable?
Hey Friends,
so, this isn't a HASHCAT issue even though at first i thought it was - because no LM hash out of the two last NTDS.dit files we opened has cracked.

however, after when we used both DCSync and a GUI software we saw that the SAME password (with the same NTLM hash) had a different LANMAN hash, can anyone explain to me how that happens? and if that makes the LM password Uncrackable?

https://pasteboard.co/HhLDEMz.png

ty

Rule for omitting duplicates in bruteforce attack?

$
0
0
Hi, I'm trying to crack a handshake using a bruteforce attack....I know the password has 12 characters uppercase+numbers, which is a lot of permutations, but I also know that all the characters in the password are unique, so I don't want hashcat wasting it's energy going through passwords with duplicate chars. Is there a rule or function I can use? I didn't find any in the wiki

Here's my code so far...
hashcat64.exe -m 2500 -a 3 capture.hccapx -1 ?u?d  ?1?1?1?1?1?1?1?1?1?1?1?1

I appreciate any help!
Viewing all 8114 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>