Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

No hashes loaded

$
0
0
I'm using the os x for dictionary attack


./hashcat capture.hccapx rockyou.txt

No hashes loaded

how should i crack this type of hash (sha1 & salt)

$
0
0
mail                    | crypted_password                                                        |  salt
  
dp@gmail.com:848XXXc9e5baf34d6dba20XXX755f4984b6d77cc:725372XXX5e22195365fbf266cd3aXXX20f1c140

w@gmail.com:00XXXX759d68827b090c63dcXXX115361fd5dc0c:NULL

its sha1 i think i can't figure out
help Tongue

--markov-disable taking more time

$
0
0
I have been performing analysis on the effects of targeted brute force on a dataset for a project I am currently working on however I have found some inconsitencies in the total time it takes to complete the attack.


I assumed that both attacks would take around the same time as the same total number of guesses is required however I found that when using --markov-disable on a ?l?u?d?s mask of size 7 that the total time to complete the attack was more than 20% longer than the optimized brute force without the --markov-disable parameter.

Is there any reason why this could be the case? (using a mobile gpu but is not thermal throttling)

Hash (xlsx)

$
0
0
Office 2010 excel şifresini bulamıyorum. Bana yardım edebilir misin? Bilgisayar donanımım hashcat kullanarak başarısız oluyor. İlginize çok teşekkür ederim.

office2john.py :
$ ofis$*2010*100000*128*16*3f5b6111d6f1904c353f32 29f7a24162 * e65e9be49a84c2d57ff454ca199b6fc3 * 8cb5c9 44c7363387f22a0ef31161f91acbf874f209f00c7cddfcae97 ed1f441e

MD5 :
7ADC19A8E0BDDA296F1FE97B221A8319
6E931997FFD291627E6AC2CB61D8F07C

Hash (xlsx)

$
0
0
Office 2010 excel şifresini bulamıyorum. Bana yardım edebilir misin? Bilgisayar donanımım hashcat kullanarak başarısız oluyor. İlginize çok teşekkür ederim.

office2john.py :
$ ofis$*2010*100000*128*16*3f5b6111d6f1904c353f32 29f7a24162 * e65e9be49a84c2d57ff454ca199b6fc3 * 8cb5c9 44c7363387f22a0ef31161f91acbf874f209f00c7cddfcae97 ed1f441e

MD5 :
7ADC19A8E0BDDA296F1FE97B221A8319
6E931997FFD291627E6AC2CB61D8F07C

Hashcat don't see correct password in txt file

$
0
0
Hello,

So I have a weird problem with hash cat, I downloaded one dictionary .txt file took password from there set to my wifi capture eapol run hashcat against it and hashcat found correct password. Everything was ok but I generated my .txt file with lots of numbers (and one number there was a correct password) I run hashcat against the same file but with my .txt file and hashcat didn't found a match and I have no idea why, every number is on a new line no spaces nothing utf-8 encoding like dictionary file that I downloaded and hashcat cannot find this password :/ Someone have any idea why?

Noob: DES-OFB key recovery w/known contents

$
0
0
Hi all.

I am new to HashCat and have been trying to figure out how to get Hashcat to recovery the encryption key when I know the original contents and encrypted contents..

Also too the files a have are all HEX files (as is the key and Init vector) if that complicates things any?

I hope someone smarter than me can point me in the right direction, I have tried the usual googling/youtubing, but I'm not finding what I'm after. Sorry if this has been asked before.

Thanks

Dave.

DES with partial plain text

$
0
0
Hi
I have a problem with recovering a DES password using Hashcat when I only know the first six bytes of the plaintext.
The plain text is say 11 22 33 44 55 66 xx xx
I know the full cipher text.


I understand that the source code needs to be patched to "white out" some bits corresponding to the unknown, two last bytes.
Then when hashcat is run using  "--keep-guessing" it will find many false positives. I can then examine them manually to find the full plain text.  

I'm only a beginner in C so I do not know which bits to "white-out". I guess the modules in question are cpu_des.c and cpu.des.h ?

Can anyone help me with this, please?
Thanks in anticipation.

How to extract hash of mssql

Intel Integrated GPU

$
0
0
I have been using hashcat for few days and I am really confused about the use of integrated GPU. 

My question if the hashcat is using my GPU, or GPU is not supported in this hardware or it is running to its full potential ?

Some information about my device,

OS:
uname -a
Linux The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) 5.5.0-kali1-amd64 #1 SMP Debian 5.5.13-2kali1 (2020-04-03) x86_64 GNU/Linux

lspci | grep "VGA"

00:02.0 VGA compatible controller: Intel Corporation 2nd Generation Core Processor Family Integrated Graphics Controller (rev 09)

hashcat -I --force

hashcat (v5.1.0) starting...

OpenCL Info:

Platform ID #1
  Vendor  : The pocl project
  Name    : Portable Computing Language
  Version : OpenCL 1.2 pocl 1.4, None+Asserts, LLVM 9.0.1, RELOC, SLEEF, DISTRO, POCL_DEBUG

  Device ID #1
    Type          : CPU
    Vendor ID      : 128
    Vendor        : GenuineIntel
    Name          : pthread-Intel(R) Core(TM) i3-2350M CPU @ 2.30GHz
    Version        : OpenCL 1.2 pocl HSTR: pthread-x86_64-pc-linux-gnu-sandybridge
    Processor(s)  : 4
    Clock          : 2300
    Memory        : 2048/5813 MB allocatable
    OpenCL Version : OpenCL C 1.2 pocl
    Driver Version : 1.4


I have installed the opencl runtime driver,

dpkg -l | grep opencl

ii  intel-opencl-icd                    20.13.16352-1                  amd64        Intel graphics compute runtime for OpenCL
ii  libopencl-clang10                    10.0.0-2                        amd64        thin wrapper for clang
ii  ocl-icd-libopencl1:amd64            2.2.12-3                        amd64        Generic OpenCL ICD Loader
ii  opencl-c-headers                    2.2~2019.08.06-g0d5f18c-1      all          OpenCL (Open Computing Language) C header files
ii  opencl-clhpp-headers                2.1.0~~git51-gc5063c3-1        all          C++ headers for OpenCL development
ii  opencl-headers                      2.2~2019.08.06-g0d5f18c-1      all          OpenCL (Open Computing Language) header files
ii  pocl-opencl-icd:amd64                1.4-6                          amd64        pocl ICD



Benchmark Test for md5

hashcat -m 0 -b --force

hashcat (v5.1.0) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

OpenCL Platform #1: The pocl project
====================================
* Device #1: pthread-Intel(R) Core(TM) i3-2350M CPU @ 2.30GHz, 2048/5813 MB allocatable, 4MCU

Benchmark relevant options:
===========================
* --force
* --optimized-kernel-enable

Hashmode: 0 - MD5

Speed.#1.........: 97361.7 kH/s (39.05ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8

Started: Tue Apr 21 17:55:41 2020
Stopped: Tue Apr 21 17:55:51 2020

hashcat.launcher is available! (an alternative to hashcatGUI)

$
0
0
Hi,
I'm happy that i have just done version 0.1.1 of hashcat.launcher (yeah there was 0.1.0 with couple issues in Windows)
Anyway..

hashcat.launcher

hashcat.launcher is a cross-platform app that run and control hashcat
it is designed to make it easier to use hashcat offering a friendly graphical user interface


Installation
  • Download a release

  • Extract

  • Execute
Changelog

Refer to CHANGELOG.md



DEMO:

https://i.postimg.cc/JnN314BW/hashcat-launcher-demo.gif

I hope you find it useful, if you have any request / feature to add, let me know
Enjoy 

DES-ECB

$
0
0
Hi,

I'm trying to test decrypting a DES-ECB hash.

I use a tool to encrypt 0000000000000000 with the key of 000000000000cccc giving the cypher text of 5c3278aafe9127de.

When I run hashcat with the following command

hashcat -a 3 -m 14000 test.hash -1 charsets/DES_full.charset --hex-charset 000000000000?1?1 -D 1

I get.....

Session..........: hashcat
Status...........: Cracked
Hash.Type........: DES (PT = $salt, key = $pass)
Hash.Target......: 5c3278aafe9127de:0000000000000000
Time.Started.....: Wed Apr 22 07:31:14 2020 (0 secs)
Time.Estimated...: Wed Apr 22 07:31:14 2020 (0 secs)
Guess.Mask.......: 000000000000?1?1 [14]
Guess.Charset....: -1 charsets/DES_full.charset, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#2.........:    83194 H/s (11.86ms) @ Accel:128 Loops:1024 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 13312/16384 (81.25%)
Rejected.........: 0/13312 (0.00%)
Restore.Point....: 12288/16384 (75.00%)
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:0-1024
Candidates.#2....: $HEX[00000000000001c1] -> $HEX[000000000000fece]

Started: Wed Apr 22 07:31:13 2020
Stopped: Wed Apr 22 07:31:15 2020

C:\HashCat>hashcat64 -a 3 -m 14000 test.hash -1 charsets/DES_full.charset --hex-charset 000000000000?1?1 -D 1 --show
5c3278aafe9127de:0000000000000000:$HEX[000000000000cdcd]


It seems to be the wrong key!

how to create .rule and .hcmask files

$
0
0
I have a password list
What software do I use to create .rule and .hcmask files
Please help me

capJS - Online CAP 2 HCWPAX Tool

Unable to get hashcat to run after GPU update

$
0
0
So long story short, I upgraded my NVIDIA Driver from 440.X to 440.82. Hashcat was working before this when I used the --force argument but now I can't seem to get it to run at all and after spending some time googling, I'm kinda running into a wall. So here's to hoping someone here can help me with my issue, or point me in the right direction.

Code:
:~$ hashcat -b                                                                                                                                                                                        
hashcat (v5.1.0-1778-gc5d2d539) starting in benchmark mode...                                                                                                                                                    
                                                                                                                                                                                                                  
Benchmarking uses hand-optimized kernel code by default.                                                                                                                                                          
You can use it in your cracking session by setting the -O option.                                                                                                                                                
Note: Using optimized kernel code limits the maximum supported password length.                                                                                                                                  
To disable the optimized kernel code in benchmark mode, use the -w option.                                                                                                                                        
                                                                                                                                                                                                                  
* Device #1: WARNING! Kernel exec timeout is not disabled.                                                                                                                                                        
             This may cause "CL_OUT_OF_RESOURCES" or related errors.                                                                                                                                              
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch                                                                                                                                      
* Device #2: WARNING! Kernel exec timeout is not disabled.                                                                                                                                                        
             This may cause "CL_OUT_OF_RESOURCES" or related errors.                                                                                                                                              
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch                                                                                                                                      
nvmlDeviceGetFanSpeed(): Not Supported                                                                                                                                                                            

CUDA API (CUDA 10.2)
====================
* Device #1: GeForce RTX 2070 with Max-Q Design, 7533/7982 MB, 36MCU

OpenCL API (OpenCL 1.2 CUDA 10.2.159) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #2: GeForce RTX 2070 with Max-Q Design, skipped

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 0 - MD5

nvrtcCompileProgram(): NVRTC_ERROR_INVALID_OPTION

nvrtc: error: invalid value for --gpu-architecture (-arch)

* Device #1: Kernel /usr/local/share/hashcat/OpenCL/shared.cl build failed.

* Device #1: Kernel /usr/local/share/hashcat/OpenCL/shared.cl build failed.

Started: Wed Apr 22 20:10:27 2020
Stopped: Wed Apr 22 20:10:28 2020

Whats the most efficient way to do this? (newbie)

$
0
0
Alright so I've got a whirlpool hash which is salted.

So the password is reversed and at the beginning they placed a word 'WIT' and at the end there is a number, users SQL id.

So the password looks like this:

lets say the password is: password
and the users sqlid is 50..

the password would be hashed like this:

WITdrowssap50

Is there a way to use sqlid with the wordslists? I'm pretty new to this but i've done whirlpool a long time ago. And how do i add the custom word at the beginning?

Help?

Benchmarks and Password per second

$
0
0
Hi everyone,

I should collect some data on the performance of the latest version of hashcat.
In particular, I'm interested at computing the number of passwords that can be hashed in the time unit for different hash functions. 
At the moment, I'm using the option -b (e.g., ./hashcat -m 17600 -b), obtaining the number of hashes per second (e.g., 1893.2 MH/s).

Now, it is not clear to me if the MH/s means "million of passwords hashed per second" or  "million of hash iterations per second". If the second interpretation is the correct one, I can compute the number of passwords hashed per second by dividing it for the number of rounds of the hash function, right?

Thanks,

Run Unpackage hashcat

$
0
0
Hi,

I want to install and run hashcat in a Non Sudo privilegies system. Then, i've decided to:

1. Download the hashcat source from https://hashcat.net/hashcat/
2. Unzipped it in a USB using 7z x
3. Unzipped it again using 7z x
4. Then, I have a folder without .sh files

How can I run hashcat from uniquely the content of this folder?

Thanks

Hascat -m 22000 on 5.1.0 Windows build

$
0
0
I am using hcxpcapngtool, which outputs in 22000 PMKID/EAPOL format. I downloaded the 5.1.0 hashcat binaries for Windows and it does not recognize the 22000 hash type using hashcat32 -m 22000 with either the 32 or 64 bit versions.

As a test, sudo apt install hashcat on my Linux machine. It installed 5.1.0 but did not recognize 22000 hash type. Then I installed from git clone make && install version 5.1.0 and it successfully recognized the 22000 hash type and successfully solved for a known passkey. Unfortunately, my Linux box has crappy motherboard graphics chip while my Windows machine has a big GeForce GTX card.

I would like to solve 22000 hash types on my Windows machine. Does anyone know of the current circumstance of the windows binaries successfully running -m 22000?

help with hashcat.

$
0
0
I assembled a farm 10x2080ti the i5-6400 processor was loading it 100%, changed the processor to i7-6700 the same problem hashcat loads 100% of the processor, what should I do? what could be the problem? as the processor boots at 100%, the farm goes into reboot. Help pls/ PAy 100$ for help btc.
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>