Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7832 articles
Browse latest View live

Cracked Passwords when using Brain

$
0
0
When using brain with multiple clients, what happens when a password is cracked by one of the stations?

1.  Where does it store the cracked password?  

2.  Does it send a signal to all of the stations to stop attacking the cracked hash?

Where are the best ringtones for 2019 for phones?

$
0
0
Hello friends
I just bought samsung galaxy s7 and want to update the latest and best ringtones for me. Can someone suggest or share it for me?
Thanks in advance.

partial match

$
0
0
Hi! I would like to find a partial match of a password i.e. the password is 20 characters long and if I find part of it, it will help me recognize the rest... I have a number of different passwords that I use and lost one of a veracrypt file I have. I sort of use a similar theme for my passwords with a few variations and finding part of the password would help me structure a better search. Any ideas? Thanks

Weird issue with hashcat v5.1.0

$
0
0
Hello,



I am seeing some strange behaviour with hashcat.



I'm trying to crack a test hash for "XMR123" - using SHA3-256:

Code:
EA5F1F228B67C17A43FBBEECAAE52A8E44A8376868BE2F8FB20E4049779F85A8



My command is:

Code:
hashcat -m 17400 -a 3 EA5F1F228B67C17A43FBBEECAAE52A8E44A8376868BE2F8FB20E4049779F85A8



However hashcat runs past the 6 char brute section...





Code:
Session..........: hashcat

Status...........: Exhausted

Hash.Type........: SHA3-256

Hash.Target......: ea5f1f228b67c17a43fbbeecaae52a8e44a8376868be2f8fb20...9f85a8

Time.Started.....: Thu Oct 17 14:09:40 2019 (56 secs)

Time.Estimated...: Thu Oct 17 14:10:36 2019 (0 secs)

Guess.Mask.......: ?1?2?2?2?2?2 [6]

Guess.Charset....: -1 ?l?d?u, -2 ?l?d, -3 ?l?d*!$@_, -4 Undefined

Guess.Queue......: 6/15 (40.00%)

Speed.#2.........:  9845.0 kH/s (8.31ms) @ Accel:8 Loops:2 Thr:256 Vec:1

Speed.#3.........: 59249.2 kH/s (1.39ms) @ Accel:16 Loops:8 Thr:256 Vec:1

Speed.#*.........: 69094.2 kH/s

Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts

Progress.........: 3748902912/3748902912 (100.00%)

Rejected.........: 0/3748902912 (0.00%)

Restore.Point....: 1490944/1679616 (88.77%)

Restore.Sub.#2...: Salt:0 Amplifier:2230-2232 Iteration:0-2

Restore.Sub.#3...: Salt:0 Amplifier:2224-2232 Iteration:0-8

Candidates.#2....: Uq6r5o -> Xqlfxj

Candidates.#3....: Wqna8q -> Xqqfqx



Without finding it, why is this?



EDIT: Same issue with SHA-256... so weird. It used to work, I have items in my potfile.



EDIT2: After further testing, and to add to the weirdness, hashcat finds:





a665a45920422f9d417e4867efdc4fb8a04a1f3fff1fa07e998e86f7f7a27ae3:123

448a5d6dc7b84c1a0de5e7dae7d55fe46bfbc857ce577235b2bcc7ab1328a77b:X123




but starts to fail at "XM123" (2f5d45aa660e38518d07258c0396eb6f19d4534aae7d6c36b049225c2a1687e6)...


Bizarre.


Thanks for the help.

Exfiltration of target material

$
0
0
Is there documentation on how to appropriately exfiltrate target hash/material for the various supported types?

I.e. how to prep MS docs to obtain hash data or Apple notes, or various FDE schemes? Thanks 😊

Brain Client won't quit

$
0
0
I've got a strange issue going on.  I am running the brain and client on the same PC.  The client has been working with the default feature 2.  On my last run I wanted to experiment with feature 3.  I am hashing in 16800 mode.  I ran a straight dictionary attack on a hash file.  About half way through the process I saw a 90MB .ldmp file show up in my directory.  It took about 6 minutes to reach the end of the process, but now it is hung.  It's like it will not commit the last step.  I have left it running for almost 2 hours, but it is still sitting idle without completing.

I am using hashcat-5.1.0+1394.

I even tried pressing Q, but it still won't quit.


.png   16800.png (Size: 100.83 KB / Downloads: 0)

Blake2b hash always has invalid token length

$
0
0
Trying to use hashcat on Blake2b-512:

Code:
hello:e4cfa39a3d37be31c59609e807970799caa68a19bfaa15135f165085e01d41a65ba1e1b146aeb6bd0092b49eac214c103ccfa3a365954bbbe52f74a2b3620c94

I always receive a message from hashcat indicating that the hash token is too long?

Hash 'e4cfa39a3d37be31c59609e807970799caa68a19bfaa15135f165085e01d41a65ba1e1b146aeb6bd0092b49eac214c103ccfa3a365954bbbe52f74a2b3620c94': Token length exception

This is my command, any ideas?

Code:
hashcat -m 600 -a 3 e4cfa39a3d37be31c59609e807970799caa68a19bfaa15135f165085e01d41a65ba1e1b146aeb6bd0092b49eac214c103ccfa3a365954bbbe52f74a2b3620c94 --increment ?a?a?a?a?a?a?a

Using discrete GPU on macOS

$
0
0
In a modern MacBook there are usually two GPUs

Integrated and Discrete, with Discrete being much more powerful.


Usually when a macOS app is utilising the discrete GPU I receive a notification to say the GPU is being used.

I don't see this notification with Hashcat, yet I see that hashcat looks like it's using both:

Code:
OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i7-8850H CPU @ 2.60GHz, skipped.
* Device #2: Intel(R) UHD Graphics 630, 384/1536 MB allocatable, 24MCU
* Device #3: AMD Radeon Pro 560X Compute Engine, 1024/4096 MB allocatable, 16MCU



Is this setup correctly?

Asus 2080 benchmark

Rule debug to found plain

$
0
0
Hello there,
Is there a way to generate a debug that tell's you what rule and word from dictionary creates the found plain.

Cheers Kev

mask search with doubles

$
0
0
Hello everyone!
You need to find the password in hashcat. Password type-abcd12abcd12 - character sets 2 or 3 times repeated. Is it possible to set a mask with repeated character sets to reduce the number of password candidates?

clBuildProgram(): CL_BUILD_PROGRAM_FAILURE

$
0
0
hello, 
getting this error on running hashcat compiled from source with the latest osx 10.15 catalina:

hashcat (v5.1.0-1403-g87022919) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

OpenCL API (OpenCL 1.2 (Sep  5 2019 21:59:08)) - Platform #1 [Apple]
====================================================================
* Device #1: Intel(R) Core(TM) i9-8950HK CPU @ 2.90GHz, skipped
* Device #2: Intel(R) UHD Graphics 630, 384/1536 MB allocatable, 24MCU
* Device #3: AMD Radeon Pro Vega 20 Compute Engine, 1020/4080 MB allocatable, 20MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 0 - MD5

clBuildProgram(): CL_BUILD_PROGRAM_FAILURE

<program source>:9:10: fatal error: 'inc_vendor.h' file not found
#include "inc_vendor.h"
        ^

* Device #2: Kernel /hashcat/OpenCL/m00000_a3-optimized.cl build failed - proceeding without this device.

clBuildProgram(): CL_BUILD_PROGRAM_FAILURE

i did install Xcode and command line tools as well
anything i do wrong or just compatibility issues with the latest version of osx ? had it run just fine with 10.14 mojave

thanks

How much memory does the brain server need to configure?

$
0
0
How much memory does the brain server need to configure?
I use hashcat64.exe on the client -z --brain-host=10.10.10.127 --brain-port=13743 --brain-password=1234
Prompt I need 10g+ of memory. I remember that brain only needs big memory? Or should I install larger memory on the client?

My amd gpu hashcat -b -m 17200 can't get the benchmark, the page can't perform hash o

$
0
0
My amd gpu hashcat -b -m 17200 can't get the benchmark, the can't perform hash operation?

Please help me test if this hash can be executed normally on amd gpu.

12.zip:$pkzip2$1*1*3*1*1412*7800*ea14f88e*0*2a*8*6*ea14*4665*12.zip*$/pkzip2$:::::12.zip

MD5 Help

$
0
0
what sort of attack would i use on an md5 hash if i only know that it is a 32 character long hex string? 

The difference between 14000 and 14100 in Function DES Encrypt

$
0
0
Hi
Why did you use the DES() in 14000_a3, while in 14100_a3 you used _des_crypt_encrypt().
Encryption speeds are higher at 14000 than at 14100.
Thanks.

Token Length Exception for m 9820

$
0
0
Trying to crack 10 MS word files for an assignment (1-9 are oldoffice$3, 10 is office 2013), the first 5 went fine with m 9800. For files 6 to 9, Hashcat managed to yield a result but upon entering the passwords, MS word says the file is corrupt/Error opening file. I assume it is due to collision, hence for file 6, I tried m 9810 which didn't work as the password is supposedly 7 characters according to the hint given. Moving onto 9820, I keep getting Token Length Exception.


This is the hash format and first password obtained with 9800:
$oldoffice$3*xxx:wt6&f1-


Below is the command I ran:
hashcat64.exe -a 3 -m 9820 -w 4 -o ~\ans.txt ~\6.txt -1 ?s?d?l ?1?1?1?1?1?1?1


Referring to the hash examples on the wiki, I did use the hash with the first password obtained from running m 9800. I am unaware of any mistakes that could've been made. Any insight would be great.


On a side note, when trying to crack file 10 with m 9600, my GPU heats up really quick, prompting Hashcat abort, is this normal?


Thanks in advance.

First year CS Student running a GTX1050 laptop (Yes, I know it is not recommended for this kinda stuff, but this is what I have to work with)

clWaitForEvents(): CL_UNKNOWN_ERROR

$
0
0
Hello all,
Can some one tell me why I am getting this error please [s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => clWaitForEvents(): CL_UNKNOWN_ERROR
clEnqueueReadBuffer(): CL_OUT_OF_RESOURCES . Only happens on sha512 with wordlist and rules.
Time out patch installed and Nvidia driver up todate
Cheers Kev

Wordlist optimisation based on ruleset

$
0
0
Hello all,

Am currently sitting on about 400GByte of unique lines worth of wordlists. I pretty much downloaded all I could find sorted and deduped them. And am finding passwords. Am pretty much only using them with the Dive & best64 rules set. But it most defiantly is not the most effective/fasted way of finding passwords. The main problem I see is that this list is filled with different versions of the same base word.

Example:

Code:
welkom
welkom01
welkom01!
Welkom

This is what rule sets are for. In my opinion. But I was wondering if any one has made a reverse ruleset engine? You input a wordlist and ruleset. And it spits out only base words that are required with rules to come to that password. I was thinking of building something like this myself but I only know python and perhaps something like this already exists.

Running hashcat on multiple hash files

$
0
0
Is there a way to do this?  I tried this:

hashcat -m 16800 --show *.16800

This actually runs, but it only shows results for the first file in the directory.
Viewing all 7832 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>