Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

Custom charset

$
0
0
Hashcat version - hashcat-5.1.0+1755\hashcat-5.1.0 beta

I am trying to run a custom charset for keyboard walking using

--custom-charset1=~!@#$%^`123456

my command line is as follows...

hashcat.exe -a 3 --session=keyboard -m 0 --custom-charset1=~!@#$%^`123456 -w 4 --status --status-timer=60 --remove -p : -O --potfile-path md5.pot --hwmon-disable -o "F:\found.txt" --outfile-format=2 -i --increment-min=6 --increment-max=14 -2 qwertyQWERTY "C:\left.txt" ?2?1?2?1?2?1?2?1?2?1?2?1?2?1

The program runs fine except for one annoying factor it wont use %^`123456 instead
it just shows --custom-charset1=~!@#$ when hashcat is running

Guess.Charset....: -1 ~!@#$, -2 qwertyQWERTY, -3 Undefined, -4 Undefined

Can someone help me get on the right track please?

Crack my BTC wallet, earn 1000 USD

$
0
0
Hello everyone,

I'm not proud of myself but here I am.

I installed bitcoin core some months ago just to give it a try. I didn't remembered there was a key on it as it was never asked when the Bitcoin client is launched.

But I received some coins on it and when I tried to do a transaction myself it asked for that damn key and I understood my mistake Sad
It looks like I didn't write the password somewhere, what I was thinking ? I don't know Sad

I tried every passwords in my password manager and tried some other passphrases that I could have used but none worked.

I don't even know if I used a shitty password (I tried rockyou though) or a longer passphrase.

I have only CPUs at home that's why I'm asking for help, it will take me way to much time to crack it.

I will give 0.15 BTC (currently a little more than 1000 USD) to the first person able to crack the hash. Reward will stay at 0.15 BTC whatever the value of bitcoin.

Here is the hash :

Code:
$bitcoin$64$d9e38b680fc533c15d26dc7233e473a8de3b2738d6271bd54860b251f35f9de6$16$bd624be2ada2969e$144557$2$00$2$00

I didn't find any suitable section in the forum so sorry to disturb

What is the diffenrence?

$
0
0
hashcat64.exe -w 3 -a 6 -m 2500 1029.hccapx test.txt ?d?d?d?d?d?d?d?d

There is a 1 word in text file in it = (ahmet) 

And all combinations take 42 days!

With this command

hashcat64.exe -w 3 -a 3 -m 2500 1029.hccapx ahmet?d?d?d?d?d?d?d?d

it takes 14 min to try all combinations

Two of them are same but why firtone takes too much time?

Thanks

Temp abort trigger only for current gpu

$
0
0
Hello, is it possible just to stop using gpu which reached high temp and  don't fully stop hashcat?

How do I extract the hash from a USB

$
0
0
So I created a USB using Veracrpt, I have all the information required to crack it (I.E Keyfiles) besides the password! In order to use Hashcat I require a hash, my question is how do I extract the hash from an encrypted USB?

All help is accepted!

Ryzen 3900x not recognized.

$
0
0
Greetings,

I recently got a new machine and I fail to understand why my CPU is not recognized when specifically trying to use it.

Code:
./hashcat64.exe -b -m 1000 -O --force -w 4

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce RTX 2080 Ti, 2816/11264 MB allocatable, 68MCU

It finds my graphic card, no problem, but no CPU.

When trying the -D 1 option :
Code:
./hashcat64.exe -b -m 1000 -O --force -w 4 -D 1

No devices found/left.

Even if the GPU is probably way faster, I was just trying to see the differences between the two. Am I missing something ?

Many thanks in advance.

Hashcat don't see correct password in txt file

$
0
0
Hello,

So I have a weird problem with hash cat, I downloaded one dictionary .txt file took password from there set to my wifi capture eapol run hashcat against it and hashcat found correct password. Everything was ok but I generated my .txt file with lots of numbers (and one number there was a correct password) I run hashcat against the same file but with my .txt file and hashcat didn't found a match and I have no idea why, every number is on a new line no spaces nothing utf-8 encoding like dictionary file that I downloaded and hashcat cannot find this password :/ Someone have any idea why?

Need Help to identify the Type

$
0
0
So i have this hash :

Code:
oeX25tin*k5cbv1xLc6FxM0x1biuYO0GGrdm8GpPX65o7zT2V3obvR0snm58m8jc2RLuaCF62c5kPjD75aeE7V+duXbAerA==

I want to know what the type of this hash and how to decrypt it in hashcat

thanks

Help to specify mask/charset/command

$
0
0
happy easter folks,

I still don't really get the right parameters for my brute-force attack

What I have:
NTLMv2 hash (do i need only the 2nd hashpart or the whole hash like provided?)
Password is 12 to 14 char long (upper/lower/digit/special)
it contains up to 4 special chars

so that's propably
Code:
?a?a?a?a?a?a?a?a?a?a?a?a?a?a
as charset(?)


The following command

Code:
hashcat64.exe -m 1000 -a 3 -o hash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a

is obviously not correct (error token length exception; no hash loaded)

Can someone help me to specify the whole command from incremental 12 chars up to 14?
Thank you very much

hcxdumptool install problem

$
0
0
Code:
sudo make install
cc -O3 -Wall -Wextra -std=gnu99  -o hcxpioff hcxpioff.c  -DVERSION_TAG=\"6.0.5-4-gb2adde8\" -DVERSION_YEAR=\"2020\"
cc -O3 -Wall -Wextra -std=gnu99  -o hcxdumptool hcxdumptool.c  -lcrypto -lssl -DVERSION_TAG=\"6.0.5-4-gb2adde8\" -DVERSION_YEAR=\"2020\"
install -m 0755 -D hcxpioff /usr/local/bin/hcxpioff
install -m 0755 -D hcxdumptool /usr/local/bin/hcxdumptool
rm -f hcxpioff
rm -f hcxdumptool
rm -f *.o *~


how can i solve this problem

another problem with capture pmkids

Code:
hcxdumptool -o hash -i wlan0mon --filterlist=filter.txt --filtermode=2 --enable_status
hcxdumptool: option '--filterlist=filter.txt' is ambiguous; possibilities: '--filterlist_ap' '--filterlist_client'
hcxdumptool 6.0.5-4-gb2adde8 (C) 2020 by ZeroBeat
usage: hcxdumptool -h for help





Thanks

algo 20710

$
0
0
Hi all, have small problem with hash 20710, Im using hashcat 5.1.0, when Im starting this algo, soft write error, "Unknown hash-type '20710' selected." Pls why can tell me, how add this algo in hashcat or whats need to do for working with this algo. Thx

Output progress over time in hashcat

$
0
0
Is there any way to retrieve the amount of hashes cracked and the time it has taken and get this to a file. 

I know I can view this data in the status page but I would like to be able to analyse the rate at which hashes are being cracked.

MD5 - Dictionary attack

$
0
0
Hi,
boys and girls,
females and male,
men and women,

I have a question.
I have this MD5 hash. I know how "it was hashed", but i cant seem to wrap around, how to crack it.
You see, i know how it was, in its unhashed state. System, you may call it that, is "20200414073337+secret+user", where the "+" is obv. Signalling fx, that secret could be "123" and user "Jessie". Then it would be "20200414073337123Jessie".
Though i know the variable user and the numbers prepending, which is a timestamp, its obv. That i would want to crack the "secret", to reveal its unhashed state. I have tried to make a small handy dandy python script, to collect some 20 wordlists, and fetch them together, in the so called "system" format, i call it. I've then tried to crack the hash, via dictionary attack by using the 1GB wordlist i've made, but no results so far. I've thought about using "rules", but the thing is, that obv. The rules only should apply to "secret". So what i'd want, is to have a wordlist, without "system" format, where it hasnt prependet timestamp and appendet user, then get hashcat to apply the rules onto the "secret", the current "word" in the wordlist, and THEN append/preppend the "system format". But i cant figure out, how i'd do that.

For those asking, it is for a session token dealing, where i'd bassicly have to crack the hash, the session token, before i can go on further, in this "pentest", if you'd call that.

So, may i ask, if you could help me?
Perhaps you may have a better solution?
Anyways, looking forward to hearing back from ya! Smile

(PS. Sorry for my horrible way of English. It's anyways not my main lang )
(PPS. This is btw my first post on the hashcat forum, so appoligies for horrible formatting, explaining problem etc)

Bruteforcing SHA1 with knowing the salt

$
0
0
Hello dear Hashcat community,
I am a studying cybersecurity on my local university. I am stucked at a task given by my lecturer. 
As the task says - I have to find the secret password just by knowing the SHA1 hash and salt. I was reading the documentation and old threads(of much older versions of Hashcat) but I still don't know how to include my salt in command. 

As far as I read on the wiki, I should use the -m parameter with 110 number and -a parameter with value 3. 

Can you please give me a tip how to make use of knowing the salt and any example of command?

I have tryed something like this but with no success:
Code:
Hashcat -m 110 -a 3 40DIGITSHA1
Cheers,
Tropikando

How this can be possible?

$
0
0
I have a Zyxel cap file!
This file have two PMKIDS

Code:
21c6a979c865366c34101c99a5e9758f*bc99110f10d7*f099bf34a8b8*5a7958454c5f4847575f4639414141

5d61f6269e0aea5886c0f1a0ccf7a2b5*bc99110f10d7*b8b7f14164f4*5a7958454c5f4847575f4639414141

same router mac same client mac same router name but different pass hashes?

What does it mean?

Thanks

Hashcat freezes, Doesn't bypass mask

$
0
0
Hello. I have problem:
I'm using 6 GPUs (Radeon rx470 X5 and one Radeon rx580 Red Devil)
My hashcat starts perfectly but after a while Hashcat freezes, but status works, when Hashcat finishes some mask and estimated time of finishing of this mask is 0 my GPUs reduce the rotation to the fans to default. Then Haschat doesn't bypass mask i.e he can't finish previous mask. Then my pc freezes and i have to reboot it.
Sorry for my bad english. Hope u got it
Drivers which i installed: Amd Software adrenalin edition (Recommend Version), Intel OpenCl for runtime

Rules attack - restore not working

$
0
0
Hello , strange things. 
I use rule attack, but restore point always  on 0%. Even if i press C - nothing happens.
Tried with --restore-file-path=x.restore 
Also no result. 
This is bug ?

Dictiionary Attack - how-to-question

$
0
0
I am new to hashcat - currently I am trying to get my (forgotten) itunes password from a itunes backup iOS 9 or older ("-m 14700") and I was wondering if anyone could tell me how to start a dictionary attack - I created a text file "password.txt" - containing passwords I recently used, the passwords are separated by comma ","

so what I did:

./hashcat -d 2 -m 14700 hash.txt -a 0 password.txt

I wonder whether the password.txt file is properly created and whether the syntax "-a password.txt" is correct - thnx in advance

pattern mask

$
0
0
hello, I'm newbie in hashcat. im trying to crack a 12 character password. i know that a component in the password is a word 'g00se'. but what i don't know is the position of the word inside the password (maybe on the beginning, middle, or the end). 

how can i make the mask appropriate? 
since it's only 7 more (alpha numeric with special chacter) digits left to crack.

any help would be appreciated, thanks.

Hashcat can no longer see CPU

$
0
0
Hi All,

I have been running some benchmarks and experiments with hashcat on a number of computers I have and I've noticed some odd behaviour.  All the machines are Windows 10/64 bit and the CPU is not showing up as an available device. As I'm benchmarking, I want to try a range of devices. I use one machine for all initial testing and I just noticed that  hashcat can no longer find the CPU even though it could a few days ago. Using that machine:

From a run on March 26 (lines compressed)
  • hashcat (v5.1.0) starting... 
  • Device #2: Intel's OpenCL runtime (GPU only) is currently broken.
  • OpenCL Platform #1: NVIDIA Corporation
  • - Device #1: GeForce GTX 1650, skipped.
  • OpenCL Platform #2: Intel(R) Corporation
  • - Device #2: Intel(R) UHD Graphics 630, skipped.
  • - Device #3: Intel(R) Core(TM) i7-9750H CPU @ 2.60GHz, 4029/16118 MB allocatable, 12MCU
From yesterday, running -I
  • OpenCL Info:
  • Platform ID #1
  •   Vendor  : NVIDIA Corporation
  •   Name    : NVIDIA CUDA
  •   Version : OpenCL 1.2 CUDA 10.1.120
  •   Device ID #1
  •     Type          : GPU
  •     Vendor ID      : 32
  •     Vendor        : NVIDIA Corporation
  •     Name          : GeForce GTX 1650
  •     Version        : OpenCL 1.2 CUDA
  •     Processor(s)  : 16
  •     Clock          : 1245
  •     Memory        : 1024/4096 MB allocatable
  •     OpenCL Version : OpenCL C 1.2
  •     Driver Version : 432.13
  • Platform ID #2
  •   Vendor  : Intel(R) Corporation
  •   Name    : Intel(R) OpenCL HD Graphics
  •   Version : OpenCL 2.1
  •   Device ID #2
  •     Type          : GPU
  •     Vendor ID      : 8
  •     Vendor        : Intel(R) Corporation
  •     Name          : Intel(R) UHD Graphics 630
  •     Version        : OpenCL 2.1 NEO
  •     Processor(s)  : 24
  •     Clock          : 1150
  •     Memory        : 3223/6447 MB allocatable
  •     OpenCL Version : OpenCL C 2.0
  •     Driver Version : 26.20.100.7811
Also from yesterday running -D1
  • hashcat (v5.1.0) starting...
  • Started: Thu Apr 16 12:49:30 2020
  • (nothing here whatsoever)                                 
  • Stopped: Thu Apr 16 12:49:30 2020
I haven't touched the hashcat install.

The system is Windows 10 Enterprise v1909 64 bit - there was one software update https://support.microsoft.com/en-us/help...-kb4549951 which includes a security update affecting the Microsoft Graphics Component.  Suspicious but roll back isn't really an option.

The device manager shows OpenCL.dll in the NVIDA and UHD drivers list


Any Ideas as to what is going on - where my CPU went - and how to get it back again?

PS> Is there a way to indent without using bullets?

Thanks
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>