Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8216 articles
Browse latest View live

length & Mask

$
0
0
1) can i know hashcat  support 64 length mask  ????
    need to use any special option??? 

2) can i know why stdin mode slow 
    mp64.exe -1 abcdef0123456789 ?1?1?1?.......... 

    how to do speed mp attack

    please

Some remarks and maybe idea for improvement

$
0
0
After usual default, wordlist, rule, hybrid approach i turn to mask approach. Since ?l(same with ?u) goes through all characters randomly, without any rule(almost), i thought this is not optimum approach. The reason is that when we fish for a password, which can resemble english language(i have three languages to worry about), it follows at least *some* linguistic rule. For example, by cycling through all characters(a-z) one by one in rockyou(for example) with command

fgrep -o a rockyou.txt | wc -l

it finds different occurence frequencies of those characters. By sorting those characters by frequencies, i found that it follows the rule of - "aeionrlstmcdyhubkgpjvfwzxq". That is, from most frequent character to least frequent character. With only this finding i could throw away 3(zxq) last characters, which would exclude about 1,9% of the characters and 2.088 x 10^11 (26^8) combinations turn into 7.83 x 10^10 (23^8). It means cracking time is reduced by 62%. Then i can turn to some other mask(with same approach) and later, when most frequent characters are used and hashes are not cracked, i turn to the least frequent characters (probably not, it may take too much time).

An important thing which i quickly realized is that first character and second character follow different rules. So after cycling through all characters based on the first position with the command

cat rockyou.txt | cut -c1-1 | fgrep -o a | wc -l

i found a different picture - "msacbljtdpkrnghiefwvoyzuxq", from most frequent to least frequent. The second character frequency line is - "aoeiurlhnmsytcdbpkjwqvf".

To cut long story short, i started doing cheesy tactics, where i started doing masks with longer lengths, but with truncated character set(starting even from first 14), from most frequent characters to least. -1 as the first character, -2 as second character and -3 all other characters. Then after exhausting(or cracking some hash) i started adding less frequent characters(to max 18-23). This is all manual and sometimes exhausting(adding characters one by one on a 8 length mask, where -3 occupies 6 slots, i have to go through all combinations manually), but the time reduced is big.

So here is the question. Is there a possibility to do this more automatically, where hashcat adds characters one by one in the mask without hitting duplicates? Well, to try to answer myself, i turned into brain solution, which is a little bit more automatic, but still doesn't solve everything and i had to set --brain-client-features 3, cause with the default approach, the custom character set doesn't work well("-1 m" only on first char, then "-1 s", then "-1 ms" should reject 100%, but doesn't). This also slows down the speed, depending on how many hashes i have.

The approach from the most frequent character set to least is comparable to mask attack, where we choose most frequent mask(ullllldd or lllllldd) to least.

So, what do you think?

how is --hex-wordlist supposed to function?

$
0
0
I'm playing around with accented characters in passwords, which inevitably results in multi-byte characters. Doing some reading, it looked like using the --hex-wordlist option would take care of this, but the candidate hex doesn't look anything like the wordlist hex.

For the word otoño:

Code:
hashcat-5.1.0$ xxd test

0000000: 6f74 6fc3 b16f 0a                        oto..o.

Code:
~/hashcat-5.1.0$ ./hashcat64.bin -m 1000 BC4A371BBA2211148EBCDEE649C561FC test -w 4 -O --hex-wordlist
...
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: NTLM
Hash.Target......: bc4a371bba2211148ebcdee649c561fc
Time.Started.....: Fri May 10 14:21:57 2019 (0 secs)
Time.Estimated...: Fri May 10 14:21:57 2019 (0 secs)
Guess.Base.......: File (test)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:        0 H/s (0.00ms) @ Accel:64 Loops:1 Thr:1024 Vec:1
Speed.#2.........:        0 H/s (0.00ms) @ Accel:64 Loops:1 Thr:1024 Vec:1
Speed.#3.........:        0 H/s (0.00ms) @ Accel:64 Loops:1 Thr:1024 Vec:1
Speed.#4.........:     4922 H/s (0.01ms) @ Accel:64 Loops:1 Thr:1024 Vec:1
Speed.#*.........:     4922 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 0/1 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-0 Iteration:0-1
Restore.Sub.#2...: Salt:0 Amplifier:0-0 Iteration:0-1
Restore.Sub.#3...: Salt:0 Amplifier:0-0 Iteration:0-1
Restore.Sub.#4...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: [Copying]
Candidates.#2....: [Copying]
Candidates.#3....: [Copying]
Candidates.#4....: $HEX[8d9e38] -> $HEX[8d9e38]
Hardware.Mon.#1..: Temp: 37c Fan: 27% Util: 42% Core:1657MHz Mem:4513MHz Bus:16
Hardware.Mon.#2..: Temp: 42c Fan: 27% Util: 42% Core:1657MHz Mem:4513MHz Bus:16
Hardware.Mon.#3..: Temp: 44c Fan: 28% Util: 42% Core:1657MHz Mem:4513MHz Bus:16
Hardware.Mon.#4..: Temp: 41c Fan: 27% Util: 42% Core:1657MHz Mem:4513MHz Bus:16

Started: Fri May 10 14:21:49 2019
Stopped: Fri May 10 14:21:59 2019

Using CPU and GPU in a cloud instance..

$
0
0
Hi folks,

been using hashcat with good results on my home gaming rig (decently fast quad core Intel CPU and a GTX 1080), however, concerns about proper handling of customer data means I need to move away from the current BYOD model.

As a solution, I'm using hashcat 5.1.0 on an Azure NV24 series VM instance (24 CPU vCores, 4 Tesla M60 GPUs).  It's Ubuntu 18.04 with the Microsoft/Nvidia drivers installed. (accoridng to https://docs.microsoft.com/en-us/azure/v...iver-setup ) all nicely recognised by nvidia-smi

The GPU performance is bearable - I can get just slightly more out of four Tesla vGPUs as I can out of my physical 1080..

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: Tesla M60, 2032/8129 MB allocatable, 16MCU
* Device #2: Tesla M60, 2032/8129 MB allocatable, 16MCU
* Device #3: Tesla M60, 2032/8129 MB allocatable, 16MCU
* Device #4: Tesla M60, 2032/8129 MB allocatable, 16MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 1000 - NTLM

Speed.#1.........: 18779.7 MH/s (27.20ms) @ Accel:64 Loops:512 Thr:1024 Vec:2
Speed.#2.........: 18357.1 MH/s (27.88ms) @ Accel:64 Loops:512 Thr:1024 Vec:2
Speed.#3.........: 18856.1 MH/s (27.08ms) @ Accel:64 Loops:512 Thr:1024 Vec:2
Speed.#4.........: 19772.7 MH/s (26.82ms) @ Accel:64 Loops:512 Thr:1024 Vec:2
Speed.#*.........: 75765.5 MH/s



My concern is - I can't get hashcat to recognise the CPU cores. tried installing an OpenCL sdk for Intel (from here; https://launchpad.net/~intel-opencl/+arc...tel-opencl ), without joy.

The GPU performance is okay - but given the pricing model in Azure, it seems wrong to leave 24 cores sat doing nothing and paying for them.

any ideas folks?

Hash type sorting

$
0
0
Is there a hash type sorting program that anyone uses?  I have been going through some of the older Korelogic challenge files and a few other misc. ones.  They all provide a large hash file with 5-10 hash types in the file.  I just use my grep-fu to tear apart the files into stand alone files by type.  Then I can use the --remove when running to slowly bring down the sizes of the file as I crack the hashes. 

Is there anything better? or just grep?

how to extract username:plain

$
0
0
I have a file both with username:hash and username:plain combinations. is there a way to extract username:plain?

Passwordlist constantly exhausted

$
0
0
Hi Everyone,

I;ve managed to work most of my learning with HashCat up to this point.

Hashcat said I exhausted the rockyou list so I added another this one is all but 500 meg and it was exhausted within the first 5 mins attempting to crack an MD5 single hash?

Here's the syntax I've been using...

root@LabMachine:~# hashcat -a 0 -m 0   -o cracked.txt  /root/Desktop/hash.txt /root/Downloads/passphrases.txt  --force



The passphrases is the latest word list I've added. Is there a way to clear out the cache is this is the problem?

Thanks,

Lost Open Docx password

$
0
0
Hello every body,

I lost my password for opening a docx document. I try to remember it but no way.

so I try to use office2john to extract the hash then after to run Hascat with rockyou.txt.... but without any result (password not found)...

Is ther some one who can help me, please ?

See U

CHAP Challenge Limit

$
0
0
Hello,

I am using hashcat to brute force decrypt my CHAP sessions.  (-m 4800).  All works fine for Challenge Salt length of 16 bytes, but I get an error when trying to use longer Challenge Salts (My Packet Capture has Value of length 26).  

Can anyone guide me to the error of my ways?

Thanks,

My hashcat will often get stuck

$
0
0
My hashcat version is 5.1.0. I found that there is often a same problem. I often get stuck when I perform a hash operation. When I press the s key or the space bar, I can continue to execute. I should ask this. What is the problem? Have friends ever encountered the same problem as me.

Operating system windows 10

Jetson Nano Benchmarks

Are two CPU's required for a 6-8 GPU rig?

$
0
0
Hey friends.

My company wants to purchase a 6 GPU rig with an option for 8.

Our IT guy says that for a 4+ GPU rig, it is a must to have two CPUs, and maybe more for an 8 GPU build.

I've never heard of that, is there any truth to that?

Hashcat parsing error- win10

$
0
0
I've been trying for hours to crack an ntlm hash, but i i keep getting the "Failed to parse hashes using the 'native hashcat' format" error. I've tried many different combinations of commands, what i normally use is "hashcat -m1000 -a3 --username -o res.txt hash.txt"
I tried with or without user: "admin:32 bit hash".
I've had the problem on more than one computer, on the other it simply worked once, don't know what was different and i also tried on linux and it worked fine there.
Also a few times the hashcat executable would randomly turn to 0 bytes, idk why; it also happened after turning the av off.

Worst wordlist wanted

$
0
0
Is there any wordlists around with all the passwords you should NOT use?
Rockyou is a bit like that, but I would like to have "the great un-ultimate wordlist".
All cartoon characters, beer brands, and the other stuff your password should not be.

Instructions to Hack Password Wifi with Hashcat -PMKID

$
0
0
The WPA2 Wifi Password Hack is almost the same for many years. Currently there is a new method of Wifi attack that is less complicated than traditional methods, especially being able to target access points no one is connected to. This method uses Hashcat to decrypt the -PMKID packet to unlock WPA passwords and allows hackers to find networks with weak passwords more easily.


Classic Hack Password WIFI Method


The old way of cracking WPA2 has been around for quite some time and involves disconnecting a device from the access point. This has two important disadvantages for Wi-Fi hackers.



The first drawback is that there must be a device connecting to Wifi. Wifi passwords can be weak and easy to crack, but if no devices are connected, there will be no chance to shake hands (handshake), so there is no chance to try cracking.



Hack Password WIFI Method with Hashcat

Instead of relying on blocking two-way communication between Wi-Fi devices for password cracking, hackers can communicate directly with Wi-Fi hotspots with new methods. On August 4, 2018, a post on the Hashcat forum detailed a new technique that promoted the attack against RSN IE (Robust Security Network Information Element) to capture the necessary information and implement Brute. -force.



Similar to WPA attacks, Hacker must catch Wifi waves that want to attack. The way is to use USB catch Wifi compatible The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux to try brute-force passwords. Instead of using Aireplay-ng or Aircrack-ng, AnonyViet will guide you to use a new Hack Password Wifi tool called hcxtool.

Hashcat drops speed

$
0
0
Hi, I started to have some issues with hashcat while hashing WPA in large sesions (more than an hour). It drops speed a lot and sometimes after doing a Checkpoint and restarting it goes well again.
Any idea of what could be the problem? card is a GTX 1060 on windows 10.
thanks.

Session..........: blanca8-9d
Status...........: Running
Hash.Type........: WPA-PMKID-PBKDF2
Hash.Target......: C:\Users\Jhon Doe\Google Drive\pass\Capturas\blanca.16800
Time.Started.....: Thu May 16 07:31:36 2019 (2 hours, 30 mins)
Time.Estimated...: Thu May 16 11:52:18 2019 (1 hour, 50 mins)
Guess.Mask.......: ?d?d?d?d?d?d?d?d [8]
Guess.Queue......: 1/2 (50.00%)
Speed.#1.........:    83136 H/s (343.84ms) @ Accel:256 Loops:128 Thr:1024 Vec:1
Recovered........: 0/13 (0.00%) Digests, 0/13 (0.00%) Salts
Progress.........: 750256128/1300000000 (57.71%)
Rejected.........: 0/750256128 (0.00%)
Restore.Point....: 4718592/10000000 (47.19%)
Restore.Sub.#1...: Salt:5 Amplifier:8-9 Iteration:2048-2176
Candidates.#1....: 78806651 -> 73705881

which version of hashcat should I choose?

$
0
0
I have two servers, and CPU has a very good performance, but the graphics card is integrated graphics (very poor performance), so I want to use CPU to crack.
In addition, the server is Win2003 32 bit, which version of hashcat should I choose?
Teachers, can you give the most ideal version of hashcat Download URL?
Thank you very much.

Any tutorials on how to use hashcat?

$
0
0
I'm at the command line and I know you enter in your options and a text file that contains your hash, but I'm lost at what else I should put in.

I also have a really bad computer/bad GPU. Are there people out there who are willing to run oclhashcat for me for a single sha1 hash?

Need help identifying a hash type.

$
0
0
I urgently want to know how can I figure out what type of hash this is:

3dfe563103ab11bec75bb5081e7a1dbe:b4

I know the password for the above hash is:

Tabakstraat1

So is there any way I can reverse it to find hash type?
Thanks

Cannot find an OpenCL ICD loader library.

$
0
0
Hi, good afternoon, I'm in need of help for this information, here's some colleague who knows how to update my NVIDIA card.
help help help

Cannot find an OpenCL ICD loader library.

You are probably missing the native OpenCL runtime or driver for your platform.

* AMD GPUs on Linux require this runtime and/or driver:
"RadeonOpenCompute (ROCm)" Software Platform (1.6.180 or later)
* Intel CPUs require this runtime and/or driver:
"OpenCL Runtime for Intel Core and Intel Xeon Processors" (16.1.1 or later)
* Intel GPUs on Linux require this runtime and/or driver:
"OpenCL 2.0 GPU Driver Package for Linux" (2.0 or later)
* NVIDIA GPUs require this runtime and/or driver:
"NVIDIA Driver" (418.56 or later)
Viewing all 8216 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>