Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8216 articles
Browse latest View live

Cpu not available

$
0
0
Hello there,

Can anyone tell me why Hashcat does not see it? 
Cpu is a Intel core i7 8700 coffee lake

Cheers Kev

3x mining rig rx570 rocm problem

$
0
0
Hi guys .

So long story short.
I bought 3 mining rigs

3 similar rigs
g4400
Asus prime z and h 270
4gb
6x AMD RX570

So i spend 2 days trying various install of ubuntu 16.04 and 18.04
i finally got rocm working but it only see one card.

After posting on their git , they seems to blame that  is due to the lack of pcie lane on the cpu side , and the mb not providing pcie gen3.
my cpu on ark
PCI Express Configurations ‡ Up to 1x16, 2x8, 1x8+2x4
Max # of PCI Express Lanes 16

my mb z270
1 x PCI Express 3.0/2.0 x16 slot (at x16 mode)
1 x PCI Express 3.0/2.0 x16 slot (max. at x4 mode, compatible with PCIe x1 and
x4 devices)
4 x PCI Express 3.0/2.0 x1 slots

from what i understand rocm , what the pcie gen3 direclty into the cpu not in trough plx bridge type...

My plan was to put those rigs in a octopulis cluster

Is it still possible to have hashcat recognized the hard use another driver like amdgpu pro?
Do i have to go with an older version necessary ?
any good amd setup tuto ?

the bios are mod , could it be only that ?, but then why one is recognized

reference post
https://github.com/RadeonOpenCompute/ROCm/issues/589


any help would be greatly appreciated

My KeePass Job Seems Slow

$
0
0
Does this look too slow for what I'm running? I was expecting higher speed than 7900 H/s on a GTX 1080.


Gear:
i7-8700k 6core
MSI GTX 1080 Duke 8G

hashcat64.exe -a 0 --session=2018-10-29 -m 13400 -w 4 --status --status-timer=60 -p : --gpu-temp-abort=90 -o "C:\***KeePass.txt" --outfile-format=3 "C:\***KeePass.hash"

STATUS:
Session..........: KeePass
Status...........: Running
Hash.Type........: KeePass 1 (AES/Twofish) and KeePass 2 (AES)
Hash.Target......: $keepass$*2*100000*222*28d2d30878*******a77e6c5c...b5d37c
Time.Started.....: Sun Oct 28 23:39:04 2018 (59 mins, 23 secs)
Time.Estimated...: Mon May 13 17:25:29 2019 (196 days, 16 hours)
Guess.Mask.......: ?1?2?2?2?2?2?2 [7]
Guess.Charset....: -1 ?l?d?u, -2 ?l?d, -3 ?l?d*!$@_, -4 Undefined
Guess.Queue......: 1/9 (11.11%)
Speed.#1.........:     7940 H/s (406.82ms) @ Accel:1024 Loops:512 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 28180480/134960504832 (0.02%)
Rejected.........: 0/28180480 (0.00%)
Restore.Point....: 0/2176782336 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:43-44 Iteration:15872-16384
Candidates.#1....: Parieri -> Pmfagin
Hardware.Mon.#1..: Temp: 63c Fan: 34% Util:100% Core:1974MHz Mem:4568MHz Bus:16

Installing a new Intel CPU runtime for OpenCL leads to a duplicate CPU platform

How much ram do you need

$
0
0
Hi guys

Quick question , how much ram do you need vs the gpu ram ?

thanks

Word generation to test cracking speed

$
0
0
Hello there,

Can anyone tell me if there is a way to (in windows) to generate/simulate a word list on your syntax to see if you would crack a known hash. I use my own generated md5 hashes then try and crack them. All is ok until i get to 8 mixed char and above example K3v1n$@g . My syntax for this is
hashcat64.exe -a 3 --session=2018-10-291 -m 0 -w 3 --force --status --status-timer=60 --potfile-disable --remove -p : -O  --gpu-temp-abort=85 -o "C:\Users\Kevo\Desktop\hashes\Cracked\md5 3.txt" --outfile-format=2 -t 60 -i --increment-min=8 --increment-max=8 -1 ?a "C:\Users\Kevo\AppData\Local\Temp\tmp7BBE.tmp" ?1?1?1?1?1?1?1?1?1?1
Time to run is 2hrs 11min with my asus 1080 card. So the chances are that it wont crack this. So back to the question is there a way to test my bruteforce against my own name pre-generated?

Sorry if this has been asked before.

Cheers Kev

md5(base64_encode($pass)) in hashcat

$
0
0
Hi!
How to decode md5(base64_encode($pass)) in hashcat?
I don't find this algoritm

Example:
6053088d05b02e35856f3aa3ce8b1c15:qawsed

qawsed in base64 = cWF3c2Vk
cWF3c2Vk in md5 = 6053088d05b02e35856f3aa3ce8b1c15

Noob trying to follow this walkthrough

$
0
0
Hi all,

I am trying to crack my own wifi and have successfully saved a .hccapx file  and am following this tutorial

I am to the point where I am running this command: hashcat -m 2500 -a3 tctsom.hccapx ?d?d?d?d?d?d?d?d --force

(tctsom is my network name and the title I renamed my file). I have to use --force because I get this error: Device #1: Not a native Intel OpenCL runtime. Expect massive speed loss.
             You can use --force to override, but do not report related errors.


When I run the command without --force.

However when I run with --force, I get this error: tctsom.hccapx: No such file or directory

My question: where is this file? I thought it would be in /etc/shadow ... apparently not. I am logged in as root on The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) and have the file saved in multiple locations... downloads... desktop...

I am missing something obvious, but I don't know what...

does nvidia need pcie lane directly into the cpu

$
0
0
Hi guys ,

Recently i have lean that rocm , driver for amd absolutely need direct pcie lane to the cpu to work. ie no south bridge or plx bridge.


I  just want to confirm , is it the same for the nvidia side ? will it work a normal cheap cpu and mb

Office 2007 Password Cracking

hashcat 5.0.0 brain-server log

$
0
0
I created a system service for hashcat brain-server.
Works well, thanks for the implementation.

Q1: Is it worth to use checkpoint in this case? If I quit (not checkpoint) for example at 40% of progress, than restart again cracking, hashcat brain-server will reject the already checked candidates.

Q2: Could you explain what does this log mean, please?

Code:
journalctl -r -u hashcat_brain_server.service

Quote:-- Logs begin at Thu 2018-10-18 17:22:17 UTC, end at Wed 2018-10-31 15:49:21 UTC. --
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000955.582892 |   0.00s |   5 | L |     0.04 ms | Long: 49412, Inc: 64, New: 63
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000955.582749 |   0.00s |   5 | R |     0.04 ms | Offset: 30528, Length: 64, Overlap: 0
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000955.577965 |   0.00s |   5 | C |     0.11 ms | Hashes: 63
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000955.577838 |   7.08s |   5 | C |     0.04 ms | Attacks: 1
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000948.496294 |   0.00s |   5 | L |     0.04 ms | Long: 49349, Inc: 64, New: 63
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000948.496146 |   0.00s |   5 | R |     0.06 ms | Offset: 30464, Length: 64, Overlap: 0
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000948.491523 |   0.00s |   5 | C |     0.10 ms | Hashes: 64
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000948.491411 |   7.46s |   5 | C |     0.03 ms | Attacks: 1
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000941.026457 |   0.00s |   5 | L |     0.03 ms | Long: 49285, Inc: 64, New: 64
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000941.026342 |   0.01s |   5 | R |     0.06 ms | Offset: 30400, Length: 64, Overlap: 0
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000941.021235 |   0.00s |   5 | C |     0.10 ms | Hashes: 63
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000941.021121 |   1.24s |   5 | C |     0.03 ms | Attacks: 1
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000939.777120 |   0.15s |   4 | L |     0.04 ms | Long: 49222, Inc: 64, New: 61
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000939.627601 |   0.01s |   4 | R |     0.04 ms | Offset: 11200, Length: 64, Overlap: 0
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000939.617166 |   0.00s |   4 | C |     0.10 ms | Hashes: 63
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000939.617053 |   5.54s |   4 | C |     0.02 ms | Attacks: 1
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000934.079385 |   0.00s |   5 | L |     0.03 ms | Long: 49159, Inc: 64, New: 63
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000934.079218 |   0.00s |   5 | R |     0.06 ms | Offset: 30336, Length: 64, Overlap: 0
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000934.074381 |   0.00s |   5 | C |     0.11 ms | Hashes: 63
Oct 31 15:49:21 Helium-XR-01 bash[27864]: 1541000934.074258 |   6.66s |   5 | C |     0.03 ms | Attacks: 1

Extracting ESSID from hccapx files

$
0
0
Title says it all really.  Is it possible to take an hccapx file and merely see what ESSIDs are in it without cracking the passwords?  
I was playing around with hcxdumptool /hcxpcaptool over the weekend and have a bunch of hccapx files I had generated with the date time as their name.  I shouldn't have done that.  Now i know some of them have more than 1 ESSID but i have no clue as to what ESSIDS are in each file, and sometimes knowing the name of a network can give hints to creating a more effective wordlist.

It would be nice if i could run some magical tool that would split the hccapx file into files for each essid and tell me the network name of each before running through hashcat.  Or if hcxpcap tool was able to do that with pcapng file.

Nvidia Quadro

$
0
0
Hello forum

in out school we can play with highend 3D workstations, each with several Quadros 6000 :-)


- does Hastcat support those Quadros 6000 to the same level as e.g. the 1080ti?


- what is the most Hashcat-friendly Linux distro at the moment (we are not allowed to install
  additional software on this machines but are allowed to boot them with any Linux Live system
  and therefore I am wondering on which Linux Live system Hashcat can be easily intalled, eg.
  with apt-get)


Thank's for any feedback!

Joe

Recovering an encrypted file

$
0
0
Hi,

as from the topic you might gather, this probably isn't the typical use-case for hashcat (or at least that's my understanding), but my problem is kind of inverse from the usual cracking problem. Short story long, I've had a filesystem corrupted making me unable to recover any of the encrypted Veracrypt files located there. As Veracrypt doesn't have any plaintext headers, it's basically impossible to find the files without going through every block and try to decrypt the first 68 bytes (well, use the first 64 bytes as the salt and then try to decrypt the next four and see  if it decrypts to VERA).

So, I know the password and plaintext (VERA), I do not know the salt, KDF nor the cipher. And to top it all, I don't know even where the file is located. Assuming that salt and header have not been corrupted and the files are not extremely fragmented, I should have a chance to recover the data at least partially.

I already made a simple python script using fastpbkdf2 and cryptoplus libraries, but using CPU it's just way too slow (cascade ciphers make the KDF quite slow). Question is, could I utilize hashcat for this purpose? If yes, then I shall delve into hashcat's manuals more deeply, but if not.. could I utilize the OpenCL kernels from hashcat? 

Or does my reasoning have a glaring hole somewhere and I just made myself a clown? Smile

brain-server


Need assistance with creating a specific rule

$
0
0
Alright, I've used hashcat for a couple of years now but today I came across a situation where my normal tricks aren't going to work.

I know that all passwords follow this pattern: ?l?l?l?d?d?d?u?u?u?s?s?s

I also know that for each ?d that the ?s is the same key in the same order.

An example password would be:

aaa123AAA!@#

What would the best approach to this be with the information that I've given?

Thanks in advance!

Thread Modes Hash Type?

$
0
0
Does anybody know what hash type this is?

recovering Idrac password

$
0
0
Hello

I have dell idrac9 and i trying to recover my password (for testing, i know my password)

the hash(SHA256)  and the salt is:
C3FDAEC49511C482DC0032AD1771C4E54127B3DF1E6EE510D77E703D3DEBC1A1Big Grin1E7214CF4A930E4D0EA103EF31C0C4B

i starting hashcat with command:

hashcat -a3 -m 1410 hash3.txt 'password' -w4 -O 

but no luck.  

Session..........: hashcat                       
Status...........: Exhausted
Hash.Type........: sha256($pass.$salt)
Hash.Target......: c3fdaec49511c482dc0032ad1771c4e54127b3df1e6ee510d77...1C0C4B
Time.Started.....: Sun Nov  4 08:51:33 2018 (0 secs)
Time.Estimated...: Sun Nov  4 08:51:33 2018 (0 secs)
Guess.Mask.......: 1q2w3e$R%T [10]
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:     4098 H/s (0.03ms) @ Accel:128 Loops:1 Thr:1024 Vec:1
Speed.Dev.#2.....:        0 H/s (0.00ms) @ Accel:128 Loops:1 Thr:1024 Vec:1
Speed.Dev.#3.....:        0 H/s (0.00ms) @ Accel:128 Loops:1 Thr:1024 Vec:1
Speed.Dev.#4.....:        0 H/s (0.00ms) @ Accel:128 Loops:1 Thr:1024 Vec:1
Speed.Dev.#*.....:     4098 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 0/1 (0.00%)
Candidates.#1....: password -> password
Candidates.#2....: [Generating]
Candidates.#3....: [Generating]
Candidates.#4....: [Generating]
HWMon.Dev.#1.....: Temp: 47c Fan: 48% Util: 13% Core: 772MHz Mem:3004MHz Bus:4
HWMon.Dev.#2.....: Temp: 51c Fan: 49% Util:  0% Core: 772MHz Mem:3004MHz Bus:16
HWMon.Dev.#3.....: Temp: 42c Fan: 46% Util: 14% Core: 772MHz Mem:3004MHz Bus:16
HWMon.Dev.#4.....: Temp: 46c Fan: 48% Util:  1% Core: 772MHz Mem:3004MHz Bus:4

Started: Sun Nov  4 08:51:25 2018
Stopped: Sun Nov  4 08:51:34 2018



how to get my password recovered?

How to crack custom hash - SHA512, SHA256, and MD5 combined

$
0
0
Hi,

I am trying to figure out how to use hashcat to crack a custom hash function. The hash I have has been hashed several hundred times in MD5, then in SHA256, etc. How could I tell Hashcat to do a custom hash function like this? I haven't seen much information about how to do this online.

By the way, each iteration uses a standard hash function with no salt.

Is hashcat hardware safe?

$
0
0
Have a good day, I understand that -w 4 may cause damage, but in general use on a gpu, will any damage be done?
Furthermore, are the temperatures accurate? And will they stay under the set max?
I know what I'm asking may seem obvious, but I just want to clarify before running it on my own hardware.
Thanks in advance! https://knowyourmeme.com/users/adamle02
Viewing all 8216 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>