Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8212 articles
Browse latest View live

Separator unmatched when using example hash

$
0
0
I'm running this command:
Code:
sudo ./hashcat64.bin -m 3200 -a 0 -p $ $2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6 wordlists/realuniq.dict

Which is the example hash for bcrypt on https://hashcat.net/wiki/doku.php?id=example_hashes

When I run this I get the following error and it looks like something weird happened to the hash:
Code:
Hash 'a-bash5.Kj0jZ0pEmm134uzrQlFvQJLF6': Separator unmatched

No hashes loaded.

The same thing happens when I try the pbkdf2 sha256 example hash:
Code:
sudo ./hashcat64.bin -m 10000 -a 0 -p $ pbkdf2_sha256$20000$H0dPx8NeajVu$GiC4k5kqbbR9qWBlsRgDywNqC2vd9kqfk7zdorEnNas= wordlists/realuniq.dict

Code:
Hash 'pbkdf2_sha2560000=': Separator unmatched

No hashes loaded.

I then replaced the $ signs with : and stopped overwriting the default separator and got the same issue:
Code:
sudo ./hashcat64.bin -m 10000 -a 0 pbkdf2_sha256:20000:H0dPx8NeajVu:GiC4k5kqbbR9qWBlsRgDywNqC2vd9kqfk7zdorEnNas= wordlists/realuniq.dict

The hash in the error looks slightly better formed this time around but the error still exists:

Code:
Hash 'pbkdf2_sha256:20000:H0dPx8NeajVu:GiC4k5kqbbR9qWBlsRgDywNqC2vd9kqfk7zdorEnNas=': Separator unmatched

No hashes loaded.


This is obviously something simple I'm doing wrong, do I need to do any sort of sanitisation/re formatting of the hash before running it through hashcat?

looking for affrodable GPU

$
0
0
Hello, I'm new using Hashcat and my setup has an old 560ti that gives arround 24000 H/s. And I'm thinking in getting another GPU that could give more H/s, as Im still trying dont wanna spend to much, and around 100€ would be mi limit.
would be a 7970 a good purchase? I could buy it for around 50, and also have the chance of getting a 6990 for 70.
or is just better to buy something newer?

thanks.

Fixed length passwords w/ wordlists

$
0
0
Hello!

I have been trying to find this, and I assume there's some elegant way to do it (pre-determined combinator? tmesis?) but here goes

As part of penetration testing I have a list of hashed passwords which are 8 characters long (don't ask) and I have wordlists that are 3-8 characters long. Basically I just want to try all passwords that contain these words.

Ideally I just want to say "given these words, pad with charset 1 (front, back, middle) so that you try all 8 character passwords"

I have setup a series of commands which operate independently, which covers most of what I need, but there has to be a better (and probably more efficient) way to do this?

rem set options=-a 6 words_3.dict ?d?d?d?d?d
rem set options=-1 ?l?d -a 6 words_4.dict ?1?1?1?1
rem set options=-a 6 words_4.dict ?d?d?d?d
rem set options=-1 ?l?d -a 6 words_5.dict ?1?1?1
rem set options=-a 6 words_5.dict ?d?d?d
rem set options=-a 6 words_6.dict ?d?d
rem set options=-1 ?l?d -a 6 words_6.dict ?1?1
rem set options=-a 6 words_7.dict ?d
rem set options=-1 ?l?d -a 6 words_7.dict ?1
rem set options=-a 7 ?d?d?d?d words_4.dict
rem set options=-a 7 ?d?d?d words_5.dict
rem set options=-a 7 ?d?d words_6.dict
rem set options=-a 7 ?d words_7.dict
rem set options=-1 ?l?d?u -a 6 words_6.dict ?1?1
rem set options=-1 ?l?d?u -a 6 words_7.dict ?1
rem set options=-1 ?l?d?u -a 6 words_5.dict ?1?1?1

hashcat benchmark not starting at all

$
0
0
I'm trying to start hashcat on Win10 using my GPU AMD RX580.
What I did so far is:
  1. Uninstalled all AMD drivers and rebooted
  2. Started Driver Fusion cleaned all AMD Display drivers and rebooted
  3. Manually removed OpenCL.dll from C:\windows\system32\ and c:\windows\syswow64 and rebooted
  4. Installed AMD Crimsson driver edition - tried 17.8.2, 17.11.1, 17.11.4
My problem:
When I try to start a benchmark for WPA2 hash with
PS D:\crack\hashcat-5.1.0> .\hashcat64.exe -m 2500 -b
It starts and just quits without any output:
PS D:\crack\hashcat-5.1.0> .\hashcat64.exe -m 2500 -b
hashcat (v5.1.0) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

* Device #2: Not a native Intel OpenCL runtime. Expect massive speed loss.
            You can use --force to override, but do not report related errors.
OpenCL Platform #1: Advanced Micro Devices, Inc.
================================================
* Device #1: Ellesmere, 3264/4096 MB allocatable, 36MCU
* Device #2: Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz, skipped.

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 2500 - WPA-EAPOL-PBKDF2 (Iterations: 4096)

PS D:\crack\hashcat-5.1.0>

Output from hashcat -I:
PS D:\crack\hashcat-5.1.0> .\hashcat64.exe -I
hashcat (v5.1.0) starting...

OpenCL Info:

Platform ID #1
 Vendor  : Advanced Micro Devices, Inc.
 Name    : AMD Accelerated Parallel Processing
 Version : OpenCL 2.0 AMD-APP (2442.8)

 Device ID #1
   Type           : GPU
   Vendor ID      : 1
   Vendor         : Advanced Micro Devices, Inc.
   Name           : Ellesmere
   Version        : OpenCL 2.0 AMD-APP (2442.8)
   Processor(s)   : 36
   Clock          : 1366
   Memory         : 3264/4096 MB allocatable
   OpenCL Version : OpenCL C 2.0
   Driver Version : 2442.8

 Device ID #2
   Type           : CPU
   Vendor ID      : 128
   Vendor         : GenuineIntel
   Name           : Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz
   Version        : OpenCL 1.2 AMD-APP (2442.8)
   Processor(s)   : 8
   Clock          : 3599
   Memory         : 6131/24526 MB allocatable
   OpenCL Version : OpenCL C 1.2
   Driver Version : 2442.8 (sse2,avx)

PS D:\crack\hashcat-5.1.0>

The same happens if I try to start mask attack.
Other benchmarks seems to work but when it reaches the WPA2 it just returns me to the command prompt:
PS D:\crack\hashcat-5.1.0> .\hashcat64.exe -b
hashcat (v5.1.0) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

* Device #2: Not a native Intel OpenCL runtime. Expect massive speed loss.
            You can use --force to override, but do not report related errors.
OpenCL Platform #1: Advanced Micro Devices, Inc.
================================================
* Device #1: Ellesmere, 3264/4096 MB allocatable, 36MCU
* Device #2: Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz, skipped.

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 0 - MD5

Speed.#1.........: 12381.1 MH/s (96.87ms) @ Accel:256 Loops:512 Thr:256 Vec:1

Hashmode: 100 - SHA1

Speed.#1.........:  4268.9 MH/s (70.02ms) @ Accel:256 Loops:128 Thr:256 Vec:1

Hashmode: 1400 - SHA2-256

Speed.#1.........:  1870.1 MH/s (80.00ms) @ Accel:256 Loops:64 Thr:256 Vec:1

Hashmode: 1700 - SHA2-512

Speed.#1.........:   461.1 MH/s (81.22ms) @ Accel:128 Loops:32 Thr:256 Vec:1

Hashmode: 2500 - WPA-EAPOL-PBKDF2 (Iterations: 4096)

PS D:\crack\hashcat-5.1.0>

Any idea what could cause this behavior?

Thread Modes dual cpu xeon 2696 v4 problem

$
0
0
hi all
a have problem
hashcat not detect my second CPU
and i use not full power (

Platform ID #2
  Vendor  : Intel(R) Corporation
  Name    : Intel(R) OpenCL
  Version : OpenCL 1.2

  Device ID #4
    Type           : CPU
    Vendor ID      : 8
    Vendor         : Intel(R) Corporation
    Name           : Intel(R) Xeon(R) CPU E5-2696 v4 @ 2.20GHz
    Version        : OpenCL 1.2 (Build 57)
    Processor(s)   : 44
    Clock          : 2200
    Memory         : 16355/65420 MB allocatable
    OpenCL Version : OpenCL C 1.2
    Driver Version : 5.0.0.57


only 50% power undefined
all tests CINEBENCHR15.038 and cpu-z_1.82  pased and show all 88 threads

GPU utilization

$
0
0
Hi,

I've been testing some Office13 cracking on 8 GPU rig (RTX 2080Ti). I've run into something weird about the GPU utilization. I've played with --skip and --limit and found out that when the limit is kinda small only some GPUs are used (no surprise here), but the computation still took like 5-10minutes which I do not consider of that short time. 

Could someone, please, explain to me what is going on in the examples below and why only a few GPUs are used or have low utilization? The cracking speed of one card is around 21,5k H/s.

The reason why I'm asking is that I generally have got limited time slots in which I can compute on the nodes and I need to get the most out of the nodes. 

Also, what other hash-modes are probably working the same? Is it something common for the slow hash-modes? 

Thanks

Note: that 10-15% utilized card was used for RDP.

Code:
$ .\hashcat64.exe -m 9600 --optimized-kernel-enable -a 3 <hash> -s 0 -l 10000 ?a?a?a?a?a?a?a?a
Hardware.Mon.#1..: Temp: 43c Fan: 30% Util: 84% Core:1935MHz Mem:6800MHz Bus:1
Hardware.Mon.#2..: Temp: 38c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#3..: Temp: 35c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#4..: Temp: 35c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#5..: Temp: 37c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#6..: Temp: 39c Fan: 29% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#7..: Temp: 34c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#8..: Temp: 45c Fan: 32% Util: 13% Core:1890MHz Mem:6800MHz Bus:1

Code:
$ .\hashcat64.exe -m 9600 --optimized-kernel-enable -a 3 <hash> -s 0 -l 80000 ?a?a?a?a?a?a?a?a
Hardware.Mon.#1..: Temp: 59c Fan: 51% Util: 85% Core:1800MHz Mem:6800MHz Bus:1
Hardware.Mon.#2..: Temp: 34c Fan: 27% Util:  0% Core: 300MHz Mem: 405MHz Bus:1
Hardware.Mon.#3..: Temp: 32c Fan: 27% Util:  0% Core: 300MHz Mem: 405MHz Bus:1
Hardware.Mon.#4..: Temp: 33c Fan: 27% Util:  0% Core: 300MHz Mem: 405MHz Bus:1
Hardware.Mon.#5..: Temp: 34c Fan: 27% Util:  0% Core: 300MHz Mem: 405MHz Bus:1
Hardware.Mon.#6..: Temp: 46c Fan: 29% Util: 87% Core:1890MHz Mem:6800MHz Bus:1
Hardware.Mon.#7..: Temp: 32c Fan: 27% Util:  0% Core: 300MHz Mem: 405MHz Bus:1
Hardware.Mon.#8..: Temp: 44c Fan: 31% Util: 10% Core:1890MHz Mem:6800MHz Bus:1

Code:
$  .\hashcat64.exe -m 9600 --optimized-kernel-enable -a 3 <hash> -s 0 -l 160000 ?a?a?a?a?a?a?a?a
Hardware.Mon.#1..: Temp: 50c Fan: 34% Util: 84% Core:1815MHz Mem:6800MHz Bus:1
Hardware.Mon.#2..: Temp: 37c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#3..: Temp: 35c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#4..: Temp: 42c Fan: 27% Util: 88% Core:1875MHz Mem:6800MHz Bus:1
Hardware.Mon.#5..: Temp: 35c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#6..: Temp: 35c Fan: 27% Util:  0% Core:1350MHz Mem:6800MHz Bus:1
Hardware.Mon.#7..: Temp: 50c Fan: 34% Util: 88% Core:1785MHz Mem:6800MHz Bus:1
Hardware.Mon.#8..: Temp: 45c Fan: 30% Util: 15% Core:1890MHz Mem:6800MHz Bus:1

Code:
$ .\hashcat64.exe -m 9600 --optimized-kernel-enable -a 3 <hash> -s 0 -l 1000000 ?a?a?a?a?a?a?a?a
Hardware.Mon.#1..: Temp: 60c Fan: 52% Util: 91% Core:1785MHz Mem:6800MHz Bus:1
Hardware.Mon.#2..: Temp: 61c Fan: 55% Util: 90% Core:1785MHz Mem:6800MHz Bus:1
Hardware.Mon.#3..: Temp: 60c Fan: 55% Util: 92% Core:1785MHz Mem:6800MHz Bus:1
Hardware.Mon.#4..: Temp: 59c Fan: 54% Util: 91% Core:1770MHz Mem:6800MHz Bus:1
Hardware.Mon.#5..: Temp: 60c Fan: 55% Util: 93% Core:1800MHz Mem:6800MHz Bus:1
Hardware.Mon.#6..: Temp: 60c Fan: 55% Util: 91% Core:1830MHz Mem:6800MHz Bus:1
Hardware.Mon.#7..: Temp: 60c Fan: 56% Util: 92% Core:1800MHz Mem:6800MHz Bus:1
Hardware.Mon.#8..: Temp: 60c Fan: 55% Util: 94% Core:1815MHz Mem:6800MHz Bus:1

Use maskprocessor with full CPU power

$
0
0
So i'm starting using maskprocesssor recently & notice on my i7 CPU & i estimate it usually generate about 300k-500k passphase per seconds instead of 71.50M/s (per core) like hashcat site claim, & the app only use 30% of my cpu. Is there anyway that i can run maskprocessor on 100% CPU power to make it faster?[/color]

regardin 2 word combination

$
0
0
Hi, i have a 1.4 Million words wordlist that i made, however i think that i can shrink it.
The wordlist in fact had about 400k words but i added first letter uppercase and all caps etc so it went to 1.4 million, and when i used the combinator tool to mix it up with itself it went to more than 300gb and i had to stop it.
so my question here is, can i put all lowercase and delete duplicates and after that use a rule to try first letter case up and down on the combinator attack ?
and the other question is, is there any way for me to calculate the final size of the list in GB ?

thanks

Kerberos 5 to hashcat ?

$
0
0
Hi,
Whch tool do you use to convert kirbi files to hash (Kerberos 5 AS-REQ Pre-Auth etype 23) to feed hashcat ?
kirbi2john.py crashes.

Thanks.

RTX Titan

Support for Intel Movidius Neural Compute Stick ???

$
0
0
What about support for Intel Movidius Neural Compute Stick??

CL_PLATFORM_NOT_FOUND_KHR - Windows 10 and GeForce 1060

$
0
0
I decided to use the hashcat a bit. I can not run the hashcat on one of the computers. I receive the message:

clGetPlatformIDs (): CL_PLATFORM_NOT_FOUND_KHR

Hashcat version: latest, today downloaded
Operating system: Windows 10 x64 - fully updated
Graphics card: Gigabyte GeForce 1060 G1 Gaming 3GB - https://www.gigabyte.com/pl/Graphics-Car...3GD-rev-10
NVIDIA drivers - GeForce Game Ready Driver version 419.35 - the latest and current
Processor: Intel Core i5-8400

So why does the hashcat not work? Google does not suggest anything, usually this problem occurs on Linux. On another (worse) computer with AMD card worked without a problem.

Several Handashakes in a sinlge file

$
0
0
Hi, i'm quite new on Hashcat, and reading from the wiki I saw that it's possible to use a dictionary attack over a single .hccapx with several handshakes. 
Do I need to first add every single handshake to the hccapx file? or could I just convert a .cap with all of the handshakes to the .hccapx file?
will hascath save the possible cracked password linked to each BSSID?

Thanks.

Command error

$
0
0
Hi Guys,

I'm new to the forum here and I'm trying to get the password for my itunes backup, I was able to extract the needed data from the manifest.plist file and tried the below command, but it gave me an error as follows:

D:\Hashcat>hashcat64.exe -m 14800 manifest.txt -a 3 -1 '?d!@$&' -2 ?u?1 ?2?1?1?1?1?1
If you specify a custom charset, you must also specify a mask.


can anybody please help to get the command that should work in my case, as I'm trying to use the Mask-Attack method using this mask (-1 '?d!@$&' -2 ?u?1 ?2?1?1?1?1?1) that was provided to me by the support team.

This mask should cover the below:
- The password length could be from 6-9 characters
- Only the 1st character could be an uppercase
- The password does contain numbers
- The password also contains symbols but limited to !@$&

2080TI keepass2 speed

$
0
0
Hello everyone!

New here and wanna talk about my tries to recover a test password from KeePass2.

I am an IT student and 2 months ago, wanna learn more about security and passwords so ... the way drive me here Smile
For a job, I want to crack a KeePass2 test password using a GeForce 2080TI.

Until now, I think I'm doing pretty well.
However, after few attempts, I get a speed well below that we expected for.

command used : hashcat64 -m 13400 -a 3 -w 4 -O (but at start, says it's not necessary and disable) with 8char-1l-1u-1d-1s-compliant.hcmask

hashcat 5.1.0
Geforce Drivers 419.35
Windows 10 PRO user
Only see my GPU into OpenCL Platform (shows as #1)

Here are the "logs" during the crack:

Session..........: hashcat
Status...........: Running
Hash.Type........: KeePass 1 (AES/Twofish) and KeePass 2 (AES)
Hash.Target......: $keepass$*2*60000*222*fc8a7bb38e7b34db84895362772e8...7d42d6
Time.Started.....: Thu Mar 21 15:28:15 2019 (18 mins, 27 secs)
Time.Estimated...: Fri Mar 22 18:56:32 2019 (1 day, 3 hours)
Guess.Mask.......: ?d?d?d?d?d?l?u?s [8]
Guess.Queue......: 1/40824 (0.00%)
Speed.#1.........:    22561 H/s (819.21ms) @ Accel:1024 Loops:512 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 24510464/2230800000 (1.10%)
Rejected.........: 0/24510464 (0.00%)
Restore.Point....: 2228224/223080000 (1.00%)
Restore.Sub.#1...: Salt:0 Amplifier:1-2 Iteration:12288-12800
Candidates.#1....: 00206hU! -> 03507sW@
Hardware.Mon.#1..: Temp: 84c Fan: 86% Util:100% Core:1965MHz Bus:16

No Throttle, speed is like that from start.

If someone got an idea, just tell please Big Grin

Thank you!

Compile Hashcat static version

$
0
0
Have any possible to compile Hashcat to a static version? 

   I found Hashcat execute file need run with OpenCL and modules. And modules folder size is about 30 megabytes. Actually, I just need one or two hash mode support. And could  I compile these shared libraries in Hashcat  rather than in modules folder.Thx!

Benchmark RTX 2080 ti / hashcat 5.1.0

$
0
0
To people interested in buying a 2080 Ti, I found this benchmark with hashcat 5.1.0 on 10 * RTX 2080 Ti

7z2Hashcat + -m 11600 issues

$
0
0
Hey folks, a friend has asked me to crack a small (33kb) 7z file he's forgotten the password to. I've used 7z2Hashcat to extract the following:

Position 1: $7z
Position 2: $2
Position 3: $19
Position 4: $0
Position 5: $
Position 6: $8
Position 7: $ad4cd6f5cbb39e780000000000000000
Position 8: $approx 61000 digits....
Position 9: $29304
Position 10: $09

When running it through hashcat, it fails with a 'no hashes loaded' and when trying Hashcat Beta (5.1) it starts to run but then fails with a segmentation error. 

I can tell than there is LZMA2 compression from the $2 at position 2, but i'm unclear how to make that matter....

The actual hash at position 8 seems faaaar too long to be correct also. 

Any ideas?

Thanks all.

truecrypt identify type of crypt

Cracking SSD password

$
0
0
Hello everybody. I need some help. I got a 1TB Samsung SSD that is password protected thru Samsung software that comes with SSD. I bough it for my steam library backup and music and pics. Was playing with it and decided to put password on it, come back grow work and plug it in and it asked for the password... I entered it and BOOM 💥 wrong password. I then remembered that I swapped few letters s with numbers. Like 1 instead of i and 5 Insteon of S and 8 instead of B. The problem isn’t I i dont remeber which one I swapped but I do remember the phrase. Is  it possible to recover the password with this program? And how? Thanks In advance.
Viewing all 8212 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>