Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

resume hashcat from known progress

$
0
0
Hello,

is there any possibility to resume hashcat by known progress?

Progress.........: 4522835968/356085800000

can i start from 4522835968

thank you in advance.

hashcat problem with huge dictionary text files (bug)

$
0
0
Hi everyone, explain me please why it is occurs?

I have 2 files where located in my external usb flash
1) pmkid.16800 - where my PMKID
2) passlist.txt - my dictionary (more than 4Gb)

When I type
hashcat -m 16800 pmkid.16800 passlist.txt -a 3 -w 3

I get this

hashcat (v5.1.0-1755-gddb641b8) starting...
OpenCL API (OpenCL 1.2 pocl 1.4, None+Asserts, LLVM 9.0.1, RELOC, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
* Device #1: pthread-AMD Ryzen 5 3600 6-Core Processor, 10851/10915 MB (4096 MB allocatable), 4MCU

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
Generated bitmap tables...


The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted. 

Session..........: hashcat                     

Status...........: Exhausted
Hash.Name........: WPA-PMKID-PBKDF2
Hash.Target......: ec2280ecedb5:ecaa25be9967:MyWifi
Time.Started.....: Sun Mar 29 17:26:01 2020 (0 secs)
Time.Estimated...: Sun Mar 29 17:26:01 2020 (0 secs)
Guess.Mask.......: 89010000469 [11]
Guess.Queue......: 470/320000000 (0.00%)
Speed.#1.........:      312 H/s (0.58ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Recovered........: 0/1 (0.00%) Digests
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 1/1 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: 89010000469 -> 89010000469


The wordlist or mask that you are using is too small.

This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.

Session..........: hashcat                     
Status...........: Exhausted
Hash.Name........: WPA-PMKID-PBKDF2
Hash.Target......: ec2280ecedb5:ecaa25be9967:MyWifi
Time.Started.....: Sun Mar 29 17:26:02 2020 (0 secs)
Time.Estimated...: Sun Mar 29 17:26:02 2020 (0 secs)
Guess.Mask.......: 89010000470 [11]
Guess.Queue......: 471/320000000 (0.00%)
Speed.#1.........:      318 H/s (0.60ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Recovered........: 0/1 (0.00%) Digests
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 1/1 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: 89010000470 -> 89010000470


The wordlist or mask that you are using is too small....etc...

Every seconds I'm getting the new block with it and I even no push "s" key
Time.Started. and Time.Estimated do not show reasonable info
What am i doing wrong, why it occurs and the process is so slow?


Thank you

no GPU connected (AMD Radeon RX5600XT)

$
0
0
Hi everyone,
I have AMD Radeon 5600XT but as I understood i couldn't use it with hashcat
so I can use CPU only

root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~# hashcat -I
hashcat (v5.1.0-1755-gddb641b8) starting...

OpenCL Info:
============

OpenCL Platform ID #1
  Vendor..: The pocl project
  Name....: Portable Computing Language
  Version.: OpenCL 1.2 pocl 1.4, None+Asserts, LLVM 9.0.1, RELOC, SLEEF, DISTRO, POCL_DEBUG

  Backend Device ID #1
    Type...........: CPU
    Vendor.ID......: 1
    Vendor.........: AuthenticAMD
    Name...........: pthread-AMD Ryzen 5 3600 6-Core Processor
    Version........: OpenCL 1.2 pocl HSTR: pthread-x86_64-pc-linux-gnu-znver1
    Processor(s)...: 4
    Clock..........: 3593
    Memory.Total...: 10915 MB (limited to 4096 MB allocatable in one block)
    Memory.Free....: 10851 MB
    OpenCL.Version.: OpenCL C 1.2 pocl
    Driver.Version.: 1.4


How to connect GPU?

HASH?

$
0
0
3c3e1a39a29de8c17266fc98f642cf1a

2fd281cdb6f1ac245c035ff4b4184060 i try brute with md5 or md4 no result Sad

use length from wordlist

$
0
0
Hello everyone,

I am trying to create a mask of 15 length that comprises of 3 parts
(5 lower case ) + (5 lower case ) + (5 digits )

the lower case is english words and I would like to read them from an english dictionary file

any ideas to put me on the correct direction?

Thank you in advance.

Is This Make A Problem for Cracking?

$
0
0
when i convert cap files to hccapx from https://hashcat.net/cap2hccapx/

In cracking screen sometimes Router's name can't see.
Is this make a problem for cracking?
And sometimes why target name not seen?


[Image: 5Tr4UI.png]

Thanks

Understanding EAPOL 4-Way Handshake and PMKID cracking

$
0
0
Hello!

I read how cracking WPA2PSK works and it seems to boil down to either capture the entire 4-way handshake or just the PMKID, if the access point broadcasts it, and then run hashcat. Now, I have a few questions.

#1: Is capturing the PMKID preferable over capturing the entire 4-way handshake? From what I understand, both provide you enough information for cracking the PMK (which is the actual access key if I'm not mistaken) and that means you'll find the PSK (the secret passphrase) once hashcat is finished. The PMKID is much easier to get since it doesn't require any clients to connect to the access point. If in both cases I only need to crack the PMK, does that mean that it takes the same amount of time with both attacks, or is the handshake method slower to crack because I need to feed hashcat more data?

#2: It seems that in the end capturing an handshake or PMKID is just to have a file to let hashcat work on. I mean, one could also stand in front of the access point and try connecting with all possible password combinations but I guess that would take much longer, hence why having a capture file to crack offline is much more convenient. Is this correct?

#3: If an access point doesn't broadcast the PMKID, a 4-way handshake attack is always viable unless the access point is using enterprise security protocols, right? Also, I suppose that to improve my defense against this type of attack, using a complex long passphrase helps a lot.

Please, correct me if I'm wrong. Thanks in advance!

Hash Mode question

$
0
0
Hello,
in the hash mode parameters list I see these:
2500 | WPA-EAPOL-PBKDF2                                | Network Protocols
2501 | WPA-EAPOL-PMK                                    | Network Protocols
16800 | WPA-PMKID-PBKDF2                                | Network Protocols
16801 | WPA-PMKID-PMK                                    | Network Protocols


What are the differences between them?
I used to get a WPA handshake in a .cap file with aircrack (disconnecting a user and waiting for his reconnection), convert it in a .hccap file an then run hashcat with hash mode 2500.
Are some of these hash easier/harder to get/crack?
Thank you.

question about hccapx

$
0
0
I encountered a unclear situation with hashcat , lately i cracked my own network with handshake file converted into hccapx hashcat file by putting the password within the wordlist and it took me only a few minutes to get the password . But after a second attempt with the same used hccapx file for the same network hashcat failed to recover the password . I'm just wondering if the hccapx file is corrupted or do i need a new fresh hccapx file to progress again ?
Even if the password is inside the wordlist that has been attached into hashcat . I mean i have no idea . Anything feasible concerning this issue ?

hashcat on raspberry pi 4

$
0
0
hello to evereyone, i want to know if is possible run hashcat on raspberry pi 4 and if it's possible.. i wanna know what i have to do it for install it. Thanks you.

Hashcat beta on ubuntu 18.04

$
0
0
Hello. I tried to install hashcat on ubuntu 18.04, but the problem is that when i try to run it, i have problem with rocm (because i have radeon rx 560) so a lot of people recommended to try hashcat beta,. How it work? what i have to do for use it?

What problems can i have if i use --force mode?

$
0
0
i have a problem like many with opencl runtim,
for cracking I have to use --force.
what problems can i have on my computer?

Hashcat help with email combining to password.

$
0
0
When I want to mass crack hashes and I obtain all the passwords, how do I get them to the correct email without having to search through all of the hashes and combine them manually. Say I just cracked 1000+ hash passwords, how would I combine them to their correct emails?

./hashcat.hctune: No such file or directory

$
0
0
I try to use hashcat64 on win10

but after i type the commands for cracking

i have this issue
Code:
./hashcat.hctune: No such file or directory

i try to create a file .bat in my hashcat directory

Code:
@echo off
set original_dir="%CD%"
cd "C:\Program Files\hashcat-5.1.0"
hashcat64.exe %*
cd "%original_dir%"


but i have always this problem

Why isn't this working, and can someone fix it?

$
0
0
Hello! I would like to know why this isn't working and if someone could fix it for me, i'm trying to do a bruteforce but it just won't work, and I don't understand what i'm doing wrong, hashcat64 -m0 --show --username -a3 -o cracked.txt.txt hash.txt.txt

rules attack

$
0
0
Good morning. I have a SHA-256 hash that matches a word from the RockYou dictionary, with changes o-0, i-1, b-6, and the first letter of the word can be a capital letter. I used some rules like so0, si1, sb6 without success. also I have problem like " Skipping invalid or unsupported rule in file rgl.rule on line 1: ta tc td te tf tg th tj tk tl tm tn tp tq tr ts tt tu tv tw tx ty tz". can you help me ?

⚡ biggest wallet.dat collection ⚡

Hashcat failing with proper character set

$
0
0
Can someone help, i was trying pentesting LM hash but so far i was unsuccessful with the following one, 24C7D6433BFC9759A85ED9C711104E5C
For hashcat character set was ?u?d?s, method was brute force. Hashcat seems exhausted.

Detecting 1 Device (CPU) not GPU

$
0
0
Hi, latest GPU driver installed, OpenCL the whole lot, and for some reason hashcat -b returns...

OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) Core(TM) i7-7700K CPU @ 4.20GHz, 8026/32107 MB allocatable, 8MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 0 - MD5 etc etc


Where is my GPU? GTX 1080 Ti

On nvidia-smi it returns...

+-----------------------------------------------------------------------------+
| NVIDIA-SMI 440.64.00    Driver Version: 440.64.00    CUDA Version: 10.2    |
|-------------------------------+----------------------+----------------------+
| GPU  Name        Persistence-M| Bus-Id        Disp.A | Volatile Uncorr. ECC |
| Fan  Temp  Perf  Pwr:Usage/Cap|        Memory-Usage | GPU-Util  Compute M. |
|===============================+======================+======================|
|  0  GeForce GTX 108...  On  | 00000000:06:00.0 Off |                  N/A |
|  0%  45C    P8    10W / 250W |      1MiB / 11178MiB |      0%      Default |
+-------------------------------+----------------------+----------------------+




Any help would be greatly appreciated as its driving me crazy!

Jack

Pregen PMKs using hashcat

$
0
0
Is it possible? 

I feel like this option would only be natural for hashcat and yet I failed to find anything within manual/wiki. Pls confirm that I'm reading it right. 

I'm aware of hxcKeys.
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>