So if I use combinator.exe to combine File1 and File2 wordlists ... can I get it to write to a third file? Because I have no idea where the information is going. It's appearing by on screen scrolling rather fast, but there's no realistic way to copy it from a fake, Windows-based DOS window (especially since it only displays the most recent 500 or so lines).
↧
I'm using Windows - where does combinator.exe write out to?
↧
Why is the gtx 570 so much faster than gtx 460 with HC?
On gpu charts both these cards get about the same score 4400, https://www.videocardbenchmark.net/high_end_gpus.html
Yet on this blog the 570 is about twice the h/s of the 460. Why is this?
https://tutorials.technology/blog/08-Has...d-amd.html
Yet on this blog the 570 is about twice the h/s of the 460. Why is this?
https://tutorials.technology/blog/08-Has...d-amd.html
↧
↧
I want to get the maximum of -S --skip before running hashcat
I want to use -s, --skip and -l, --limit to implement distributed cracking
The problem I'm currently facing is that I can't get the total amount of Restore. Point...: 81450625/81450625 (100.00%) when I start running the instructions.
The problem I'm currently facing is that I can't get the total amount of Restore. Point...: 81450625/81450625 (100.00%) when I start running the instructions.
↧
I have trouble accessing
Hi all,
I am using hashcat in hybrid mode (mode 7) on hashes that I know represent emails.
On the left side, I am using a mask file, with multiple masks. This mask file changes for each hash (it
contains first name, last name, combinations of those, etc.). On the right side, I use a wordlist of common domain names.
Because of the fact that the mask file changes for each hash (different first name last name combos), I am starting hashcat anew for every hash. I used some NodeJS scripts to function as wrapper for that. That works.
At each invocation however, hashcat is mentioning that I am not providing the GPU with enough work.
I have read the FAQ entry about providing more work here
I have tried these approaches to increase the GPU utilization:
1. increasing the amount of masks and increasing the amount of domains - didn't help
2. instead of using a hybrid attack with masks and domain lists, I tried to accomplish the same using multi rules. Creating the multi rules worked fine, but running it still leads to the same / similar low GPU utilization
Ergo, I am at a loss how to keep the GPU occupied. Does the root of the problem perhaps lie in the fact that I am starting hashcat for one by one hashes, instead of a long hashcat file. Any help is much appreciated, thank you.
Some background info: I am using hashcat inside Docker that has OpenCL.
I am using hashcat in hybrid mode (mode 7) on hashes that I know represent emails.
On the left side, I am using a mask file, with multiple masks. This mask file changes for each hash (it
contains first name, last name, combinations of those, etc.). On the right side, I use a wordlist of common domain names.
Because of the fact that the mask file changes for each hash (different first name last name combos), I am starting hashcat anew for every hash. I used some NodeJS scripts to function as wrapper for that. That works.
At each invocation however, hashcat is mentioning that I am not providing the GPU with enough work.
I have read the FAQ entry about providing more work here
I have tried these approaches to increase the GPU utilization:
1. increasing the amount of masks and increasing the amount of domains - didn't help
2. instead of using a hybrid attack with masks and domain lists, I tried to accomplish the same using multi rules. Creating the multi rules worked fine, but running it still leads to the same / similar low GPU utilization
Ergo, I am at a loss how to keep the GPU occupied. Does the root of the problem perhaps lie in the fact that I am starting hashcat for one by one hashes, instead of a long hashcat file. Any help is much appreciated, thank you.
Some background info: I am using hashcat inside Docker that has OpenCL.
↧
WPA raw to cap/hccapx?
How can I convert raw WPA hash to hccapx, I'm using this site to generate the raw hash?
https://www.wireshark.org/tools/wpa-psk.html
https://www.wireshark.org/tools/wpa-psk.html
↧
↧
Slow hash and fast hash
1. How to know if the password belongs to slow hash or fast hash
2. Slow hash is not suitable for brain servers. How to distribute slow hash to crack
2. Slow hash is not suitable for brain servers. How to distribute slow hash to crack
↧
hybrid attack can't use all gpu power?
Hi friends.
a have 5 gpu 1080ti and hybrid attack is exellent in my case
I made wordlist with help of combipow
So i have about 100 words
i use hybrid attack with mask like
It's rather many work to do. But hashcat running about 1 day and only 1 gpu in use with terrible speed 7-10 h/s
Usual speed for 1 gpu is about 5000 H/s
When i use just mask attack with ?a?a?a?a?a?a?a?a - the speed is good, but i don't need such variant.
I already read "How to create more work for full speed?"
But can't understand how i can implement this to my case. Need exact wordlist + mask.
Only one idea came to me - make wordlist with all variants and use Straight attack.
a have 5 gpu 1080ti and hybrid attack is exellent in my case
I made wordlist with help of combipow
So i have about 100 words
i use hybrid attack with mask like
Code:
-a 6 -m 11300 hash.txt wordlist.txt -1 dig_symbols.charset ?1?1?1?1?1?1 --increment
It's rather many work to do. But hashcat running about 1 day and only 1 gpu in use with terrible speed 7-10 h/s
Usual speed for 1 gpu is about 5000 H/s
When i use just mask attack with ?a?a?a?a?a?a?a?a - the speed is good, but i don't need such variant.
I already read "How to create more work for full speed?"
But can't understand how i can implement this to my case. Need exact wordlist + mask.
Only one idea came to me - make wordlist with all variants and use Straight attack.
↧
Does the new method work out of the box with Cali?
So there's a new method using hexdumptool, does it work out of the box with The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) and will it work on windows?
Does it still require your WiFi adapter to be put into monitor mode?
Does it still require your WiFi adapter to be put into monitor mode?
↧
Will I be OK with tethering phone with The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)?
Not directly a HC I know but maybe someone can help. I have no WiFi just now but I have 4g on my phone, I'm wondering if it will be straightforward to tether the 4g in The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux?
↧
↧
DMG - OpenCL hash
hey does anyone know how to convert DMG - OpenCl hashes to MD5 or if hashcat support DMG - OpenCL. I used john the ripper to extract the hash from an old dmg file of mine but it came out in that format ( long file with about 2000 characters ) . I was wondering if there was a way to convert it to MD5 so i can use it with hashcat as its password guesses per second is much faster( 1800 vs nearly 1 billion ) or if hashcat supported that file type .
I have attached the file so yall can get an idea of what im talking about
I have attached the file so yall can get an idea of what im talking about
↧
Hashing NTLM with frequencies
I just downloaded the huge dump of NTLM hashes, but the file has a colon and the number of frequencies at the end of each line.
Sorry for such a basic question, but what parameter do I use to ignore the : and the number at the end of each line. I am getting the No Hashes Found error.
Thanks.
Sorry for such a basic question, but what parameter do I use to ignore the : and the number at the end of each line. I am getting the No Hashes Found error.
Thanks.
↧
Hey I'm a complete noob am I'm just starting to learn about the world of hacking
So I'm looking to hack a password it’s 7 character long. The first 6 are the lower case the last Is as digit 0-9, the passwords are hashed in md5. How would I go about cracking thisI have a hash and cracked file in the hashcat folder.
Thanks, guys really loving hash cat so far and would love to learn more about cybersecurity.
Thanks, guys really loving hash cat so far and would love to learn more about cybersecurity.
↧
cloud computing
Hello,
Is it possible to use hashcat via cloud computing?
If so can I use unlimited computing power depening how money I will spent?
tori
Is it possible to use hashcat via cloud computing?
If so can I use unlimited computing power depening how money I will spent?
tori
↧
↧
CL_INVALID_BUFFER_SIZE
I have a 20GB NTLM hash file that I am testing with and I get the error CL_INVALID_BUFFER_SIZE. Is there a maximum number of hashes that can be processed in one job?
↧
Dynamic, distributed, unreliable node cluster?
I'm trying to come up with a way of using spot instances (or equivalent) on vast.ai and the traditional cloud providers.
I have found some front ends, and a few dated write ups for automatically deploying, but nothing seems to cover shutting down instances when done, or managing nodes that may abruptly be removed.
I'd like to keep the front end running someplace 24/7, if can be done on the cheap, but I read the front end needs fast mysql access.
Starting instances manually isn't a big deal, having them shutdown and stop the running cost is.
I'm working and part time living out of a cargo van with limited solar power so running a desktop with GPUs isn't practical. I do have a few older laptops, but the hash rate leaves a lot to be desired...
Has someone figured this out yet? Or is it something to cobble together from existing guides and make a new guide for?
I'm trying to do this all on a tight budget.
Thanks
SB
I have found some front ends, and a few dated write ups for automatically deploying, but nothing seems to cover shutting down instances when done, or managing nodes that may abruptly be removed.
I'd like to keep the front end running someplace 24/7, if can be done on the cheap, but I read the front end needs fast mysql access.
Starting instances manually isn't a big deal, having them shutdown and stop the running cost is.
I'm working and part time living out of a cargo van with limited solar power so running a desktop with GPUs isn't practical. I do have a few older laptops, but the hash rate leaves a lot to be desired...
Has someone figured this out yet? Or is it something to cobble together from existing guides and make a new guide for?
I'm trying to do this all on a tight budget.
Thanks
SB
↧
Adding PCFG to slow_candidates
Reviving the discussion started in this thread: https://hashcat.net/forum/thread-7936.html
BLUF: I'm starting to write a PCFG guesser implementation in C with the eventual goal of getting it included as a slow candidate mode in Hashcat.
Current Python PCFG code: https://github.com/lakiw/pcfg_cracker
I will be starting a new repo shortly for the C only version of the guess generator. I plan on both versions using the Python training program to generate rulesets/grammars.
Question:
1) Are there templates for the five functions for sc mode? I'm going to quote Atom below on those five functions
The five functions in general are the following:
BLUF: I'm starting to write a PCFG guesser implementation in C with the eventual goal of getting it included as a slow candidate mode in Hashcat.
Current Python PCFG code: https://github.com/lakiw/pcfg_cracker
I will be starting a new repo shortly for the C only version of the guess generator. I plan on both versions using the Python training program to generate rulesets/grammars.
Question:
1) Are there templates for the five functions for sc mode? I'm going to quote Atom below on those five functions
The five functions in general are the following:
- sc_pcfg_init - A function which resets all internal structures of the generator as it would be started freshly from the commandline. It will also provide the mandatory and optional parameters a user can specify in a struct. It will return a context to work with. The context enables multi threading functionality.
- sc_pcfg_keyspace - A function which simply returns the total number of candidates which the generator will create based on the parameter configuration. If the total number is unknown this has some disadvantages. For instance, the ETA can not be computed or it may not be possible to distribute it via hashtopolis. In this case return (u64) -1 and hashcat will assume the generator will give a negative returncode in the seek/next function (explained next).
- sc_pcfg_seek - Seek to a specific candidate position. This is mandatory, the parameter will be just a number. Will also have a returncode if there's no such position
- sc_pcfg_next - Output the next password candidate (based on the context)
- sc_pcfg_shutdown - A cleanup function
↧
help with the basics
so when i type
hashcat64 -a 3 -m 0 hash.txt ?l?l?l?l?l?l0 -o cracked.txt
i get this
D:\hashcat-5.1.0\hashcat-5.1.0>hashcat64 -a 3 -m 0 hash.txt ?l?l?l?l?l?l0 -o cracked.txt
hashcat (v5.1.0) starting...
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1060 6GB, 1536/6144 MB allocatable, 10MCU
Hashfile 'hash.txt' on line 1 (256E7FC8BD23003238A6E55763A7371F ): Token length exception
No hashes loaded.
Started: Sat Aug 17 10:35:13 2019
Stopped: Sat Aug 17 10:35:13 2019
D:\hashcat-5.1.0\hashcat-5.1.0>
any help would be really... well helpful
hashcat64 -a 3 -m 0 hash.txt ?l?l?l?l?l?l0 -o cracked.txt
i get this
D:\hashcat-5.1.0\hashcat-5.1.0>hashcat64 -a 3 -m 0 hash.txt ?l?l?l?l?l?l0 -o cracked.txt
hashcat (v5.1.0) starting...
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1060 6GB, 1536/6144 MB allocatable, 10MCU
Hashfile 'hash.txt' on line 1 (256E7FC8BD23003238A6E55763A7371F ): Token length exception
No hashes loaded.
Started: Sat Aug 17 10:35:13 2019
Stopped: Sat Aug 17 10:35:13 2019
D:\hashcat-5.1.0\hashcat-5.1.0>
any help would be really... well helpful
↧
↧
Hashcat temperature control only works when one GPU used at a time?
Hey, so I've run into a strange issue with Hashcat v4.1 on Ubuntu 18.04. It seems that the GPU temperature control only works when a single GPU is used at a time. When enabling two GPUs at once, the GPU auto fan speed kicks in which is way more conservative and leads to much higher temps and therefore crashes.
I've just now tried upgrading to v5.1, but it seems the GPU fan speed control was removed entirely?
This is a dual R9 290 setup with AMDGPU-Pro OpenCL drivers.
I've just now tried upgrading to v5.1, but it seems the GPU fan speed control was removed entirely?
This is a dual R9 290 setup with AMDGPU-Pro OpenCL drivers.
↧
Using hashcat with maskprocessor - here: veracrypt
Hello ![Smile Smile]()
I have forgotton a part of my password for a VeraCrypt Container. So I want to find it again with the mask processor.
For doing that I used following command
because it's burned on a dvd.
For that I've got the following answer
Is there anybody who could give me a hint, what I've made wrong?
TIA
Snoop

I have forgotton a part of my password for a VeraCrypt Container. So I want to find it again with the mask processor.
For doing that I used following command
Code:
hashcat -a 3 13711 partIremember?d?s --increment 17:19 /path/to/the/My\Volume
For that I've got the following answer
Code:
hashcat (v5.1.0) starting...
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
* Device #2: Not a native Intel OpenCL runtime. Expect massive speed loss.
You can use --force to override, but do not report related errors.
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: Quadro K1200, 1010/4043 MB allocatable, 4MCU
OpenCL Platform #2: The pocl project
====================================
* Device #2: pthread-Intel(R) Core(TM) i7-7700 CPU @ 3.60GHz, skipped.
Hash '13711': Token length exception
No hashes loaded.
Started:
Stopped:
Is there anybody who could give me a hint, what I've made wrong?
TIA
Snoop
↧
Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
I need to use brute force to crack the password. I know about the password that it has exactly 1 capital letter (A-Z), exacly 1 number (1-9) and exacly 10 lowercase letters (from a to z).
I have Python script that generates this type of passwords, but I don't know how to turn it into a hashcat mask.
I have Python script that generates this type of passwords, but I don't know how to turn it into a hashcat mask.
Code:
import random
random.seed(None)
lowers = 'qwertyuiopasdfghjklzxcvbnm'
uppers = 'QWERTYUIOPASDFGHJKLZXCVBNM'
number = '0123456789'
length = 12
while True:
uprspot = random.randint(0, length-1)
numspot = uprspot
while uprspot == numspot:
numspot = random.randint(0, length-1)
strgen = ""
for i in range (0, length):
if i == uprspot:
strgen += random.choice(uppers)
elif i == numspot:
strgen += random.choice(number)
else:
strgen += random.choice(lowers)
print(strgen)
↧