Possible? Also to change/add some arguments.
↧
Saving progress, changing wordlist, resuming from the saved progress
↧
bitlocker external keys
hi,
heads up, question not related to hashcat.
had a question and hopefully can some one answer that to me.
recently i have checked a thumb drive (DOK) which is encrypted with bitlocker.
when checking the numeral password and the external keys
with this command "manage-bde -protectors X: -get"
i have received 4 different External Key.
i decide to encrypt one of my drives to see if the result is the same, instead of receiving 4 external keys i received only one external key for my drive.
my question is, what does this External Key means?
and why they are 4 in that DOK and only one in mine.
thanks.
alot
heads up, question not related to hashcat.
had a question and hopefully can some one answer that to me.
recently i have checked a thumb drive (DOK) which is encrypted with bitlocker.
when checking the numeral password and the external keys
with this command "manage-bde -protectors X: -get"
i have received 4 different External Key.
i decide to encrypt one of my drives to see if the result is the same, instead of receiving 4 external keys i received only one external key for my drive.
my question is, what does this External Key means?
and why they are 4 in that DOK and only one in mine.
thanks.
alot
↧
↧
1Password Competition
Is anyone using Hashcat to play the 1Password Game competiton? (https://bugcrowd.com/onepasswordgame)
If you are, I'd like some help with the syntax of the command I should be using. I can't get the samples to crack, so clearly I'm missing something![Smile Smile]()
Thanks,
Philip.
If you are, I'd like some help with the syntax of the command I should be using. I can't get the samples to crack, so clearly I'm missing something

Thanks,
Philip.
↧
New user, custom brute force help
So I'm a beginner at hashcat, and I'm looking for some help setting up a custom brute force rule.
It's fairly simple although I have no idea how to set it to only try those strings though.
I already know the string I'm looking for exists out of exactly 10 characters and only capital letters and numbers
So I want to brute force but only with those standards set.
Any help is appriciated,
Thanks.
It's fairly simple although I have no idea how to set it to only try those strings though.
I already know the string I'm looking for exists out of exactly 10 characters and only capital letters and numbers
So I want to brute force but only with those standards set.
Any help is appriciated,
Thanks.
↧
hashcat64 has stopped working
Hi,
I'm an experienced user trying to use hashcat on a new windows 10 machine but no matter what I do, it crashes.
I use a 1080ti and i7-7700 with 64gb of ram
I started by copying my old version of hashcat with all my rules filters etc but this crashed
I ran the benchmark and the example.cmd files but they also crash.
Downloaded the older and newer version of hashcat (3.6, 4.1.0, 4.1.1) and nvidia drivers (390.77 through 397.31) and throughout I have the same error:
C:\hashcat-4.1.0>example0.cmd
C:\hashcat-4.1.0>hashcat64.exe -t 32 -a 7 example0.hash ?a?a?a?a example.dict
hashcat (v4.1.0) starting...
<popup hashcat64 has stopped working>
When I try hashcat32 it take a couple of seconds before crashing.
I also cant figure out how to get a log file to see where the problem is.
Any advise?
TIA
I'm an experienced user trying to use hashcat on a new windows 10 machine but no matter what I do, it crashes.
I use a 1080ti and i7-7700 with 64gb of ram
I started by copying my old version of hashcat with all my rules filters etc but this crashed
I ran the benchmark and the example.cmd files but they also crash.
Downloaded the older and newer version of hashcat (3.6, 4.1.0, 4.1.1) and nvidia drivers (390.77 through 397.31) and throughout I have the same error:
C:\hashcat-4.1.0>example0.cmd
C:\hashcat-4.1.0>hashcat64.exe -t 32 -a 7 example0.hash ?a?a?a?a example.dict
hashcat (v4.1.0) starting...
<popup hashcat64 has stopped working>
When I try hashcat32 it take a couple of seconds before crashing.
I also cant figure out how to get a log file to see where the problem is.
Any advise?
TIA
↧
↧
[Copying] for a long time
Hi,
Cmd line:
hashcat64.exe -m 120 -a 6 -w 4 -O D:\dic.txt ?a?a?a?a?a?a
Any idea why the 2 other cards do not work ?
The left side is a dic of 500 words -> not enough?
The right side is a 6*?a -> I guess it's enough
Keypsace is 376367048000000 which is enough work, no?
Thanks.
Cmd line:
hashcat64.exe -m 120 -a 6 -w 4 -O D:\dic.txt ?a?a?a?a?a?a
Quote:Status...........: Running
Hash.Type........: sha1($salt.$pass)
Hash.Target......: xxx
Time.Started.....: Mon May 07 19:02:31 2018 (42 mins, 50 secs)
Time.Estimated...: Wed May 09 03:51:10 2018 (1 day, 8 hours)
Guess.Base.......: File (xxx), Left Side
Guess.Mod........: Mask (?a?a?a?a?a?a) [6], Right Side
Guess.Queue.Base.: 1/1 (100.00%)
Guess.Queue.Mod..: 5/7 (71.43%)
Speed.Dev.#1.....: 33540.4 kH/s (2.01ms) @ Accel:64 Loops:1024 Thr:896 Vec:1
Speed.Dev.#2.....: 0 H/s (0.00ms) @ Accel:128 Loops:1024 Thr:896 Vec:1
Speed.Dev.#3.....: 0 H/s (0.00ms) @ Accel:64 Loops:1024 Thr:896 Vec:1
Speed.Dev.#*.....: 33540.4 kH/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 814743552/3961758400000 (0.02%)
Rejected.........: 0/814743552 (0.00%)
Restore.Point....: 0/512 (0.00%)
Candidates.#1....: xxx -> xxx
Candidates.#2....: [Copying]
Candidates.#3....: [Copying]
HWMon.Dev.#1.....: Temp: 55c Fan: 0% Util: 13% Core:1936MHz Mem:4513MHz Bus:1
HWMon.Dev.#2.....: Temp: 53c Fan: 22% Util: 0% Core: 164MHz Mem: 405MHz Bus:1
HWMon.Dev.#3.....: Temp: 49c Fan: 0% Util: 0% Core: 177MHz Mem: 405MHz Bus:1
Any idea why the 2 other cards do not work ?
The left side is a dic of 500 words -> not enough?
The right side is a 6*?a -> I guess it's enough
Keypsace is 376367048000000 which is enough work, no?
Thanks.
↧
Mask starting with a dash
Looks like hashcat has a problem with masks that start with a dash:
Finally got it to work:
But that's not an immediately obvious solution, and the documentation does not mention any need for special treatment of a dash.
Code:
e:\hashcat-4.1.0>hashcat64 -O -w 3 -m 0 -a 6 --gpu-temp-disable 66343_left.txt files -?d
hashcat64: unknown option -- ?
Invalid argument specified.
e:\hashcat-4.1.0>hashcat64 -O -w 3 -m 0 -a 6 --gpu-temp-disable 66343_left.txt files "-?d"
hashcat64: unknown option -- ?
Invalid argument specified.
e:\hashcat-4.1.0>hashcat64 -O -w 3 -m 0 -a 6 --gpu-temp-disable 66343_left.txt files "\-?d"
hashcat (v4.1.0) starting...
<snip>
Candidates.#1....: angel\-1 -> zzzoe\-7
e:\hashcat-4.1.0>hashcat64 -O -w 3 -m 0 -a 6 --gpu-temp-disable 66343_left.txt files $HEX[2D]?d
hashcat (v4.1.0) starting...
<snip>
Candidates.#1....: angel$HEX[2D]1 -> zzzoe$HEX[2D]7
e:\hashcat-4.1.0>hashcat64 -O -w 3 -m 0 -a 6 --gpu-temp-disable 66343_left.txt files ?-?d
hashcat (v4.1.0) starting...
<snip>
Syntax error: ?-?d
e:\hashcat-4.1.0>hashcat64 -O -w 3 -m 0 -a 6 --gpu-temp-disable 66343_left.txt files '-?d'
hashcat (v4.1.0) starting...
Candidates.#1....: angel'-1' -> zzzoe'-7'
Finally got it to work:
Code:
e:\hashcat-4.1.0>hashcat64 -O -w 3 -m 0 -a 6 --gpu-temp-disable -1 - 66343_left.txt files ?1?d
<snip>
Candidates.#1....: angel-1 -> zzzoe-3
But that's not an immediately obvious solution, and the documentation does not mention any need for special treatment of a dash.
↧
Minimum investment on a descent rig for 16+ character NTLM passwords
Hi,
I wish to attempt to crack NTLM/NTLMv2 hashes extracted from a SAM database via brute-force/dictionary attack to improve my pentesting skills. The passwords will be 16+ characters in length.
* What are the minimum specifications my workstation should have have in terms of CPU, GPU, Memory etc?
* How much money do I need to invest (as a minimum)?
* Is it mainly GPU I need to concern myself of? Would a bitcoin mining rig work for this?
Thank you in advance!
I wish to attempt to crack NTLM/NTLMv2 hashes extracted from a SAM database via brute-force/dictionary attack to improve my pentesting skills. The passwords will be 16+ characters in length.
* What are the minimum specifications my workstation should have have in terms of CPU, GPU, Memory etc?
* How much money do I need to invest (as a minimum)?
* Is it mainly GPU I need to concern myself of? Would a bitcoin mining rig work for this?
Thank you in advance!
↧
Hashcat Errors and Line Length Exception
I have a hash i am trying to crack. I placed this hash as is inside a file called passwordhash.hash
*27D47D48F5C4982E785A7BB31D471DF945395AAD
I run this command:
hashcat -m 300 -a ~/Documents/passwordhash.hash ~/Documents/rockyou.txt
I get line length exception on each password in the dictionary like so:
WARNING: Hashfile 'rockyou.txt' on line 178975 (tillman1): Line-length exception
WARNING: Hashfile 'rockyou.txt' on line 178976 (tikka): Line-length exception
WARNING: Hashfile 'rockyou.txt' on line 178977 (tiki): Line-length exception
I ran the hash using john and hash-identifier, they both identify the hash to be mysql.
Possible Hashs:
[+] MySQL 160bit - SHA-1(SHA-1($pass
Loaded 1 password hash (mysql-sha1, MySQL 4.1+ [SHA1 128/128 AVX 4x])
What am i doing wrong here? i read elsewhere the Line-length exception has something to do with the mode.
After adding -a 0 i get
ERROR: clGetDeviceIDs() : - 1 : CL_DEVICE_NOT_FOUND
*27D47D48F5C4982E785A7BB31D471DF945395AAD
I run this command:
hashcat -m 300 -a ~/Documents/passwordhash.hash ~/Documents/rockyou.txt
I get line length exception on each password in the dictionary like so:
WARNING: Hashfile 'rockyou.txt' on line 178975 (tillman1): Line-length exception
WARNING: Hashfile 'rockyou.txt' on line 178976 (tikka): Line-length exception
WARNING: Hashfile 'rockyou.txt' on line 178977 (tiki): Line-length exception
I ran the hash using john and hash-identifier, they both identify the hash to be mysql.
Possible Hashs:
[+] MySQL 160bit - SHA-1(SHA-1($pass
Loaded 1 password hash (mysql-sha1, MySQL 4.1+ [SHA1 128/128 AVX 4x])
What am i doing wrong here? i read elsewhere the Line-length exception has something to do with the mode.
After adding -a 0 i get
ERROR: clGetDeviceIDs() : - 1 : CL_DEVICE_NOT_FOUND
↧
↧
Question regarding brute forcing hex charsets
I came by this blog post (http://blog.bitcrack.net/2013/09/crackin...guage.html) regarding brute forcing passwords from other language character sets, e.g. Arabic as in the blog post. Just wanted to try it out on my computer to see how it went, but having some difficulties reproducing the example, so wondering if someone maybe can point out where the error is?
At first I tried just copying the commands as written in the blog post, but that didn't work (hashcat 4.1.0) , probably due to not specifying it's a hex-charset. Adding --hex-charset to the mix and I get a integer overflow on the mask used in the example.
Using hex range 80-BF gives you 64 possibilities per char in pw + 4 possible base hex chars per char in pw, thus a total of 68^n possibilities where n is length of pw.
E.g., n = 6, you should have to go through 68^6 ~= 100 billion (100*1e9) combinations.
Using a GTX 1080 Ti (~11500 MH/s for SHA1), this shouldn't really take that long - but, it does (reduced number of chars in pw I want to try to 6 chars). Thus, I wonder what more needs to be altered in the example in order for this to work? I'm probably missing something simple, but just can't see what it is.
Command I've tried:
At first I tried just copying the commands as written in the blog post, but that didn't work (hashcat 4.1.0) , probably due to not specifying it's a hex-charset. Adding --hex-charset to the mix and I get a integer overflow on the mask used in the example.
Using hex range 80-BF gives you 64 possibilities per char in pw + 4 possible base hex chars per char in pw, thus a total of 68^n possibilities where n is length of pw.
E.g., n = 6, you should have to go through 68^6 ~= 100 billion (100*1e9) combinations.
Using a GTX 1080 Ti (~11500 MH/s for SHA1), this shouldn't really take that long - but, it does (reduced number of chars in pw I want to try to 6 chars). Thus, I wonder what more needs to be altered in the example in order for this to work? I'm probably missing something simple, but just can't see what it is.
Command I've tried:
Code:
./hashcat64.bin -m 100 sha1list -a 3 -1 d8d9dadb -2 808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebf ?1?2?1?2?1?2?1?2?1?2?1?2 --hex-charset -O -o cracked.txt
↧
Cooling
I have just built a PC with i7 hexacore 32gb ram aorus z320 MB 700W PSU and a 1080 ti 11gb. I need to set my fans to 100% to keep it under 80c. Is this normal and if it is how long could I keep it running for with out breaking it.
↧
insert a character after each character
I'm reading https://hashcat.net/wiki/doku.php?id=rule_based_attack and I see ipX, which seems kind of what I want, but I want to be able to tell it to do it after every character. Do I just need to write the rule out like 31 times? An example of what I'm looking for is like if I want to put a 1 after every character, so it checks:
p1assword
pa1ssword
pas1sword
pass1word
etc
Do I just need to do i01, i11, i21, i31, i41, etc, all the way up to some length that I choose?
p1assword
pa1ssword
pas1sword
pass1word
etc
Do I just need to do i01, i11, i21, i31, i41, etc, all the way up to some length that I choose?
↧
Bruteforce mode / pw length
Hi.
Is there a way to run hashcat in a bruteforce mode with a specified minimum password length?
Is there a way to run hashcat in a bruteforce mode with a specified minimum password length?
↧
↧
Hashcat piping doesn't work (WPA/2)
I'm trying to pipe maskprocessor output to hashcat. In my case piping doesn't work properly. I have tested everything with only maskprocessor, separately from hashcat. Maskprocessor makes expected wordlist. I understand rule of -q and -r in maskprocessor. But piping doesn't work.
Router password was "ddade123". That password exist in wordlist made by maskprocessor. Hashcat can't crack password with shown pipe between maskprocessor and hashcat. It makes exhausted status...
I'm very confused. Where is a problem? Wrong piping or somthing else?
Hashcat and maskprocessor run by CMD win 10 x64, hashcat( I've tried with a lot of versions), maskprocessor 0.73. Hashcat and maskprocessor extracted to same folder on C disk.
Code:
mp64 -q 3 -r 4 ?l?l?l?l?l?d?d?d | hashcat64 -m 2500 test.hccap
Code:
mp64 -q 3 -r 4 ?l?l?l?l?l?d?d?d -o wordlist.txt
I'm very confused. Where is a problem? Wrong piping or somthing else?
Hashcat and maskprocessor run by CMD win 10 x64, hashcat( I've tried with a lot of versions), maskprocessor 0.73. Hashcat and maskprocessor extracted to same folder on C disk.
↧
Hashcat 4.1.0 slow speed
I'm using GTX 1050 graphic card and I have installed lastest graphic driver. There is no speed problem with hashcat version 3.00. My graphic card can run 95k H/s with hashcat 3.00. Problem occurs with hashcat 4.1.0 version. Graphic card can run 1k H/s only with 4.1.0. When I append -w 3 to commandline speed grow up to 15k H/s. It's slow in compare with hashcat 3.00. How to speed up?
↧
Iphone Encrypted Backup Help Needed
All,
I was having issues with my iPhone and restored it on my MacBook. I did not realize that the backup was encrypted. I was able to get the appropriate hash. I changed a few characters to protect the innocent. I tried ./hashcat -a 3 -m 14800 iphone.txt ?a?a?a?a?a?a?a?a?a?a?a?a based off what I could find in the help file and on videos. But it said it would take 269 years or something on my MacBook. But the examples were using simple numbers not custom characters. I also could not figure out how to get a mask or dictionary attack to work properly. I tried using -1 !QAZ@WSX3qazwsxedcrfvng1234567890DSyou to make it faster for a custom list. I never could make the dictionary attack work. I have lost a bunch of stuff because I thought everything was backed up. Now I killed my primary copy on my phone and the backup is encrypted and I do not know the pw. Am I missing the forest for the trees and there is an easier method? I need more specific examples of the lines I should run to efficiently get the password. Thanks in advance.
$itunes_backup$*10*...?
I was having issues with my iPhone and restored it on my MacBook. I did not realize that the backup was encrypted. I was able to get the appropriate hash. I changed a few characters to protect the innocent. I tried ./hashcat -a 3 -m 14800 iphone.txt ?a?a?a?a?a?a?a?a?a?a?a?a based off what I could find in the help file and on videos. But it said it would take 269 years or something on my MacBook. But the examples were using simple numbers not custom characters. I also could not figure out how to get a mask or dictionary attack to work properly. I tried using -1 !QAZ@WSX3qazwsxedcrfvng1234567890DSyou to make it faster for a custom list. I never could make the dictionary attack work. I have lost a bunch of stuff because I thought everything was backed up. Now I killed my primary copy on my phone and the backup is encrypted and I do not know the pw. Am I missing the forest for the trees and there is an easier method? I need more specific examples of the lines I should run to efficiently get the password. Thanks in advance.
$itunes_backup$*10*...?
↧
beginner help, best method?
Hi, what would be the best way to find a 9 character long string consisting of lowercase words and ending with numbers? The only thing is that I don't know how many words or numbers there are. I have a list of all English words, but I can't figure out how I'd do this. Simply brute-forcing it with my computer takes too long.
↧
↧
Crack my BlockChain.info wallet 1 password
Hi guys.
I really need some help cracking the password for my blockchain.info wallet.
Heres what i`ve done so far.
1) created wallet.aes json file for my wallet ID
2) Installed Python 2.7
3) Downloaded hashcat 4.1.0
4) Created possible passwords list(I have tried them all but I might have mixed some symbols in there)
5) Installed a couple other Python addons (not sure if it was necessary)
So far i'm trying something like cmd: hashcat64 -m 16500 --force -D 1,2,3 wallet.aes password.txt -w 3 -r rules\dive.rule
But i need to convert json to .hash file? something like that? wallet.aes to .txt file? I`m noobie on hashcat..
Do I need to install anything else?
Really appreciate any help..
Thanks !
I really need some help cracking the password for my blockchain.info wallet.
Heres what i`ve done so far.
1) created wallet.aes json file for my wallet ID
2) Installed Python 2.7
3) Downloaded hashcat 4.1.0
4) Created possible passwords list(I have tried them all but I might have mixed some symbols in there)
5) Installed a couple other Python addons (not sure if it was necessary)
So far i'm trying something like cmd: hashcat64 -m 16500 --force -D 1,2,3 wallet.aes password.txt -w 3 -r rules\dive.rule
But i need to convert json to .hash file? something like that? wallet.aes to .txt file? I`m noobie on hashcat..
Do I need to install anything else?
Really appreciate any help..
Thanks !
↧
8 x Tesla V100 Benchmarks on GC
↧
Increment knowing the last chars of password
Hi there,
I wonder if there is a way to instruct hashcat to make incremental brute force knowing the last chars of a password.
E.g. given I know the last three chars as "ord", would like to instruct hashcat to do:
ord
?aord
?a?aord
?a?a?aord
?a?a?a?a?aord
?a?a?a?a?a?aord
It would be something specular to https://hashcat.net/wiki/doku.php?id=fre...e_password
regards,
essence
I wonder if there is a way to instruct hashcat to make incremental brute force knowing the last chars of a password.
E.g. given I know the last three chars as "ord", would like to instruct hashcat to do:
ord
?aord
?a?aord
?a?a?aord
?a?a?a?a?aord
?a?a?a?a?a?aord
It would be something specular to https://hashcat.net/wiki/doku.php?id=fre...e_password
regards,
essence
↧