Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

Solar Powered Hascat - Checkpoint

$
0
0
Hello, 

I use solar power for hashcat machine.  When sunset  machine off automatically because power off.

I need that hashcat save last point (checkpoint)  every 5 or 10 minutes. 

Hot to I set it ?

Dictionary cache building

$
0
0
Dictionary cache creation hangs very slowly, what could be the problem?
AMD Ryzen 5950x, 3080 Ti

Metamask

$
0
0
Hi, I have a Metamask wallet connected to my Chrome browser (stored locally), but I have forgotten my password. I was stupid enough to not save my recovery phrase, and after days of trying to type my password, I cant get in.

Is there a way to crack my metamask password using hashcat under these circumstances?

I have a list of words that I would most likely have used, so cracking my password shouldn't be too hard, the problem is I have no idea how. I have tried watching multiple videos and reading multiple posts on here, but it is confusing to me.

Any advice is greatly appreciated

Mask-attack problem

$
0
0
Hi, i am new to hashcat and i am trying to crack a password of a doc file using mask-attack but it doesnt work. Any problem with my command?

the hash is: $oldoffice$3*8091d422a0b42fb39356bb99b44c0053*85721df43e10635f0243204c7650b1b1*5e0c14a74a029c335700229ba724f11505fdc1d9

the password should be 57913
here is the output of my cmd:


C:\Users\Dell\Downloads\hashcat-6.2.4>hashcat -m 9800 -a 3 hash1.txt ?d?d?d?d?d
hashcat (v6.2.4) starting

OpenCL API (OpenCL 2.1 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics 620, 736/1598 MB (399 MB allocatable), 24MCU

./OpenCL/m09800_a3-optimized.cl: Pure kernel not found, falling back to optimized kernel
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 15

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Host memory required for this attack: 19 MB

Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 9800 (MS Office <= 2003 $3/$4, SHA1 + RC4)
Hash.Target......: $oldoffice$3*8091d422a0b42fb39356bb99b44c0053*85721...fdc1d9
Time.Started.....: Fri Nov 12 11:19:45 2021 (0 secs)
Time.Estimated...: Fri Nov 12 11:19:45 2021 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?d?d?d?d?d [5]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  1611.0 kH/s (4.74ms) @ Accel:16 Loops:10 Thr:8 Vec:4
Recovered........: 0/1 (0.00%) Digests
Progress.........: 100000/100000 (100.00%)
Rejected.........: 0/100000 (0.00%)
Restore.Point....: 10000/10000 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-10 Iteration:0-10
Candidate.Engine.: Device Generator
Candidates.#1....: 19899 -> 68999

Started: Fri Nov 12 11:19:43 2021
Stopped: Fri Nov 12 11:19:46 2021

Hi, gonna try cracking my Litecoin wallet

$
0
0
Hi, i am trying to crack my Litecoin wallet, forgot the password.

What is the best approach? Which libraries, or just bruteforce? (How long would it take to just bruteforce it if it is 16 characters. Lol)

I have some of the password, i just cant fit it together right, and my mind cant guess correctly, was hoping a machine could guess better.

If anyone could script me a little program to run with hashcat to run everything smoothly i could pay.

I really need access to this wallet!

Help much appreciated!

Problems getting started

$
0
0
Lenovo i7-4790 3.6GHz with 8GB ram under W10 Pro 64b

Been running JTR for several months on this hash with no luck ... downloaded hashcat v6.2.4 today ... can someone please help me get out of the starting gate


hash.txt (extracted from shadow file in a BusyBox image for a no-name [IPCAM] IOT Wifi PTZ Camera)
The camera failed shortly after 100 days, both AliExpress and Seller refuse to refund or replace the camera ... manufacturer sold me a focusing subboard that failed but refuses to help trouble-shooting further ... bit-bashed the image file using the main board's serial port connection but I need to either find or bypass root to get at the command line ... focus board moves the 2 motors in both directions during post ... however when using manual commands the motors only go in one direction to an endpoint and won't come back (camera totally out of focus) ... as there are no endpoint sensors I am expecting there may just be a typo in the control script(s) or possibly a corrupt script file. Speaking with the camera support people is like talking to a wall. They have their set talking points (seem not to understand English questions) ... without a fix, I have a 25lb boat anchor


hashcat .\hash.txt


root:$1$kEm.07pW$y2WwEr/YemT7wTMj7.2f81:0:0:root:/root:/bin/sh


ends with the following errors and suggests running with option -O


clLinkProgram(): CL_LINK_PROGRAM_FAILURE

* Device #1: Kernel ./OpenCL/m00500-pure.cl build failed.


hashcat -O .\hash.txt

ends with the following error

* Device #1: Not enough allocatable device memory for this attack.

Rules or mask understanding (Specify number of chars/numbers)

$
0
0
Hi!

I'm having some issue trying to understand the rules/masks.

What I'm looking for is a mask that has all lowercase chars, and numbers. The length of the password is 8, and the split of chars and numbers is 6 chars, and 2 numbers.

Now for the orientation, which is where I'm struggling: The two numbers can be anywhere.
Meaning the password can be any permutation of this:
aaaaaa00 -> 00aaaaaa [for example aa0a0aaa, or a0aaaa0a]

Now I'm having a hard time trying to get this to work.
I have a -1 ?l?d, and if i use the mask ?1?1?1?1?1?1?1?1 i would obviously get a giant data set that can have more or less than 2 numbers.

The passwords I'm trying to reach specifically (to avoid confusion) is something like these;
u99hauad
en3dtd7y
1m8hnmkw

Can anyone help me understand how to either fix the mask to my needs, or explain how a rule might fix this problem?

Thanks

RTX 3060ti only 6 H/s ??? ..... and no CPU found

$
0
0
Dear Hashcat members,

Pretty much lost with recovering my ETH-wallet password for keystore file.
I'm getting only 6 H/s with a RTX 3060ti. How can that be and how to solve?
Another thing is that, when trying to use the CPU, hashcat doesn't find a CPU when trying with -D 1 command (Intel OpenCL runtime installed) --> no device found. I've also checked it with: "hashcat -I" and there it's only showing my GPU. How to solve that?
Any help would be pretty much appreciated.

Thanks a lot in advance & greetings

How to divide Maskprocessor results in to multiple files

$
0
0
Hi everyone. I am pretty new to the cracking world. I understand how hashcat and maskrpocessor works. Right now I am struggling with 11-12 char long passwords. I was wondering is there is any way to see a mask that will generate password files for every 10milion passwords, or smth like this. Or maybe there is a way to take password candidates for hashcat while maskprocessor is generating them, then remove all processed candidates

Give hashcat format to someone to crack Password.....

$
0
0
Dear Hashcat-Members,

If giving the hashcat compatible format string (from original UTC-file)

(e.g.  $ethereum$s*1024*8*1*437964c9bd1b5f63bde56560808c894792f8f670694590b776e22381e32dd33b*7f5c865554d67604394ae54d7a4f9735bdb85c90e606a672d18add1d167d793b*96f2a849321cc04cb6c0fcee1bd4b195ca681ca28064dc45000f02e47230c5b6)

out of a original UTC-file like this

(e.g. {“version”:3,”id”:”5cf4711d-3f69-4636-89d0-b304a7e23b75″,
“address”:”f418f8185f2c1163ae953bf778acc6877b9bc203″,
“Crypto”:{“ciphertext”:”7f5c865554d67604394ae54d7a4f9735bdb85c90e606a672d18add1d167d793b“,
“cipherparams”:{“iv”:”ae4e8c9c2ac201d6c2baa58ff670fd39″},
“cipher”:”aes-128-ctr”,
“kdf”:”scrypt”,
“kdfparams”:{“dklen”:32,”salt”:”437964c9bd1b5f63bde56560808c894792f8f670694590b776e22381e32dd
33b“,”n”:1024,”r”:8,”p”:1},
“mac”:”96f2a849321cc04cb6c0fcee1bd4b195ca681ca28064dc45000f02e47230c5b6“}}

to someone to crack the password out of it: Will he be able to generate the original UTC-file out of it, to steal the funds or does he need the original UTC-file to do that then, as there are more informations in it (written in white besides the colored informations)?

Would be nice to know, as I'm not enough involved in skripting to know that myself.

Thanks for your answers

Zenon Crypto Wallet - 11300?

$
0
0
Hi Everyone,

Has anyone ever come across trying to crack a Zenon (ZNN) crypto wallet?
It seems to be based on the Bitcoin Core wallet and bitcoin2john does return what seems to be a valid BTC hash.

I haven't been able to crack the hash yet but I'd just like to know if anyone else has come across this and therefore using the -m 11300 is the right way to go ???

Thanks, VC

WINHELLO2hashcat

$
0
0
Prologue
Since a couple of years now, Microsoft introduced WINDOWS HELLO in the operating system Windows 10 in order to let the user sign-in on a more personal way: using the face, fingerprint or a PIN.
When the user adds a local Win10 account and chooses to activate the Windows Hello PIN, there still is the possibility to sign-in with the user password.
But, when adding an online Win10 account, the user is asked - by default - to setup a PIN. This became the only way to sign-in to this account.
 
In September '21, Microsoft made some publicity about pushing their users to use a PIN.
https://docs.microsoft.com/en-us/windows...n-password
 
However, is there a possibility to crack this PIN?
 
After doing some self-study, reading blogs, reading code on Github, and trying to understand what happens...we finally got it. Sort of. Wink
Thanks to the exceptional reverse-engineering work of @tijldeneut, we understood that there is in fact a way to crack the PIN.
We also saw that he implemented a "--pinbrute" possibility, which we - for this Proof of Concept - extracted, cleaned and optimised.
 

Technical overview - TL;DR
Unfortunately the PIN does not have an easy-to-extract hash.
We wrote a tool WINHELLO2hashcat.py to do the hard work. Please visit our GitHub (https://github.com/Banaanhangwagen/WINHELLO2hashcat) to learn all the details.
 

Technical overview - detail
There are multiple steps one needs to follow (based on the article of @tijldeneut):
 
1) Parsing the NGC protector
First we need to determine the PIN_GUID, which can be found in the Next Generation Credential-folder: \Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Ngc.
Each user has a subfolder there with a specific GUID; it contains encrypted data, but no keys.
In the `...\NGC\`-folder, there are some .dat-files which contain metadata
  • user SID (1.dat)
  • provider (7.dat)
In the `...\NGC\[GUID]\Protectors\1`-folder, we find protected data, and some other metadata
  • Key1 GUID (2.dat)
  • Timestamp in LE (9.dat)
  • Encrypted data (15.dat)
This NGC-encrypted-data is RSA-encrypted and requires a private key which is DPAPI-encrypted with the PIN.
If a PIN is activated we should find a Software Key Provider (7.dat) with a corresponding GUID (2.dat).
 
2) Parsing the Crypto Keys
Next we need to go to the private keys folder: `%windir%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys` and parse all the keys.
They all contain metadata (key type (RSA or ECS), the Key GUID and the Public Key in clear text) + two System DPAPI blobs. The first DPAPI-blob contains the Private Key Properties, which can be decrypted with a System DPAPI key and a static entropy string.
 
3) RSA Private Key Properties
These RSA Private Key Properties contain two important fields: PIN_salt and PIN_rounds.
 
4) System Master Key
The decrypted System Master Key is also needed to fulfill 2). Therefore we need the SECURITY and SYSTEM hives.
 
5) Convert the PIN
 
Steps in order to convert the provided PIN:
Code:
Stage 1: convert the provided string to a specific hex format
        Phase A: convert each char to the hex ASCII representation
        Phase B: take the hex value of the uppercase representation of each nibble
        Phase C: concat and convert to UTF-16-LE representation
Stage 2: derive the previous value with PBKDF2-SHA256 with the provided salt and iterations
Stage 3: get the hex representation of the derived bytes in uppercase + convert it to UTF-16-LE
Stage 4: compute the SHA512 of this value
 
In Python:
Code:
def convert_userpin_to_secretpin(user_pin: str, pin_salt: bytes, pin_rounds: int) -> bytes:
    stage1_hexpin = user_pin.encode().hex().upper().encode('UTF-16LE')
    stage2_pbkdf2 = hashlib.pbkdf2_hmac('sha256', stage1_hexpin, pin_salt, pin_rounds)
    stage3_hexconvert = stage2_pbkdf2.hex().upper().encode('UTF-16LE')
    stage4_sha512 = hashlib.sha512(stage3_hexconvert).digest()
    return stage4_sha512
 
6) Check the PIN (proof of concept)
Finally, we need to verify that the provided sign matches the computed-one based on the provided masterkey, hmac, verif_blob and "secret pin" bytes.
 
Code:
    The hash algo used by default is SHA512 (for Win10 and Win11).
Stage 1: prepare the master key
        Phase A: compute the SHA1 of the master key
        Phase B: append 108 bytes of 0x0 (to have a bytearray of 128 bytes)
Stage 2: create two separate seeds (sub_digest_seed and main_digest_seed)
        - sub_digest_seed is the masterkey xored with 0x36
        - main_digest_seed is the masterkey xored with 0x5c
Stage 3: compute the sub digest
        SHA512(
            sub_digest_seed +
            hmac +
            '\x78\x54\x35\x72\x5a\x57\x35\x71\x56\x56\x62\x72\x76\x70\x75\x41\x00' +
            secret_pin +
            verif_blob)
Stage 4: compute the main digest
        SHA512(main_digest_seed + "stage3 digest")
 
In Python:
Code:
def is_signature_matching(sign: bytes, masterkey: bytes, hmac: bytes, verif_blob: bytes, secret_pin: bytes) -> bool:
    sha512_blocsize = 128
# Stage 1 : prepare the master key
masterkey = hashlib.sha1(masterkey).digest()
masterkey += ('\x00' * 108).encode()
 
# Stage 2 : create two separate seeds (sub_digest_seed and main_digest_seed)
sub_digest_seed = bytes(a ^ b for (a, b) in zip(masterkey, b'\x36' * sha512_blocsize))
main_digest_seed = bytes(a ^ b for (a, b) in zip(masterkey, b'\x5c' * sha512_blocsize))
 
# Stage 3: compute the sub digest
sub_digest = hashlib.sha512()
sub_digest.update(sub_digest_seed)
sub_digest.update(hmac)
sub_digest.update(b'\x78\x54\x35\x72\x5a\x57\x35\x71\x56\x56\x62\x72\x76\x70\x75\x41\x00' + secret_pin)
sub_digest.update(verif_blob)
 
# Stage4: compute the main digest
main_digest = hashlib.sha512()
main_digest.update(main_digest_seed)
main_digest.update(sub_digest.digest())
if main_digest.digest() == sign:
        return True
 
    return False
 
 
Extract the hash
Inspired by https://github.com/tijldeneut/dpapilab-n...keysdec.py, we wrote a tool from scratch - called WINHELLO2hashcat.py - to extract the needed variables, and to format it into a readable hash for Hashcat.
 
This is the format:
Code:
$WINHELLO$*SHA512*{pin_iterations}*{pin_salt}*{sign}*{masterkey}*{hmac}*{verif_blob}*{entropy}
 
This script will be published and maintained on our GitHub - https://github.com/Banaanhangwagen/WINHELLO2hashcat
 
 
Remarks about TPM
  • The above mentioned technique only works on systems without TPM-chip. The NGC Crypto Provider will no longer be “Microsoft Software Key Storage Provider” but rather “Microsoft Platform Crypto Provider”. The file `15.dat` will not be present.
  • As a reminder, in order to install Windows 11, a TPM-chip is mandatory. However, this requirement can be bypassed using an officially documented technique. (https://support.microsoft.com/en-us/wind...e77ac7c70e)
 
 
Remarks about PIN
  • A Windows Hello PIN is minimum 4 and maximum 127 characters long. (https://docs.microsoft.com/en-us/windows...e-defaults )
  • By default only digits are activated. Nonetheless, the user can chose to "include letters and symbols" in the PIN. Only non-accented letters, digits and special characters from ASCII-table are accepted.
  • During our testing, the pin_iterations were always 10000.
 
 
Remarks about signature check
During our testing, the hash algo used by default was always SHA512 (for Win10 and Win11).
 
 
Remarks about NGC
Reading the code on @tijldeneut's GitHub, we understand that when a Windows Hello PIN is used, the user-password can be extracted in clear (!) from disk.
Unfortunately, our tests with his tool were not always successful and we didn't have the time to deep-dive into this.
We encourage you to experiment with his code and to suggest any fixes or optimizations.
 
 
Credits
This work couldn't be possible without the hard work of:

Hashcat-Team, I LOVE YOU!!!!!!! Got my Dad's eth password back!!!

trying to crack my bitcoin wallet hash

$
0
0
HI All!!!

Hope everyone is having a good day!

so i am trying to password crack bitcoin wallet for my brother. its a old backup so naturally hes forgotten his password and no seed phrase. 

iv got a bit of info from him tho in terms of what kind of passwords he was using back then but even with that info i havent got far at all with cracking the hash.

im curently using the one rule to rule them all - rule which i researched up and saw it has a good susess rate but upon trying it multiple times, i rekon is not what will work for me due to the password being more on the complexed side.  ( also used dive rule and no luck there either ) 

so now im wondering if the problem might be the password list i made for hashcat and if in actual fact his password was not even close or even more complexed. 

maybe i just need to make a custom rule? wouldent even know where to start as im a noob haha.

also i wanted to ask is there a way of getting hashcat to report when it has sucessfully decrypted letters/numbers/ special characters ? for example if the password was B1ngB0ng27 and hashcat managed to figure out that the first letter is B and the last letter or nunber is 7, is it possible to extract that data? 

not even sure if thats possible but it would be a super big help if it could right? 

anyways any help would be super appricated!!  and if someone is willing to write me a rule based on the passwords my bro has given me, that would be super awesome tooooo!!!

Bitcoin hash length question

$
0
0
Hi All,

Can anyone please tell me if there is a standard length or lengths for Bitcoin hashes generated using bitcoin2john ?

For a test I created a Bitcoin Core wallet with a simple password, ran it through bitcoin2john and then cracked it using Hashcat. Everything was fine.

I then compared that hash with one that I've been trying to crack for almost a week and noticed that its hash string is 1 character longer. Is this right? Is this to be expected ?

Any help would be most appreciated please.

Best, Chris

Compress file size

$
0
0
Good afternoon. When creating a list with possible passwords, 2 questions arose. There is a file in the extension .txt file size is about 1 TB, the file contains 15 billion lines. Each line is a hash of 64 characters [a-f,1-9], it is also a possible password option.
1. Is it possible to compress the file size somehow?
2. By what means can I check duplicates in the file?

Hashcat partial hash

$
0
0
Hello community and sorry to be the newbie here who asks questions Smile
I have just a simple question:
It's possible in current binaries to search for a partial sha256? or should i modify the source code?
The mode that interests me it's 1410 (i know the salt) but i have partial part of hash (last 28 chars).
I know that false positives will be high but that doesn't matter.

Thank you

sudden drop in cracking speed

$
0
0
Hey everyone

I've been using hashcat since 5.1 and still use the same hardware, namely a NVIDIA GeForce GTX 1070 (GPU) and an Intel(R) Core(TM) i7-8700 (CPU).
In those ~3 years, I've had a consistent speed of 30'000 MH/s on NTLM. Since ~1 year I also installed the recommended CUDA Toolkit and OpenCL Runtime, which improved the speed by a tiny bit.

Now, since 2 weeks or so, I'm only getting 600 kH/s when I try rockyou.txt on any NTLM hash. I didn't change anything on the hashcat installation nor did I alter drivers or anything. The weird thing is, that the benchmark still shows the normal speed of 30'000 MH/s. I researched on this and found some people saying that the speed drops if you don't provide enough work. However, I have cracked NTLM hashes in the past using rockyou.txt and have had a consistent speed of 30'000 MH/s and didn't experience any speed drop. I use the same commands I have also used in the past. Thus, this sudden drop in speed doesn't make any sense to me. I think it's also not a hardware issue, as the benchmark still shows the normal speed.
I reinstalled all drivers, CUDA, OpenCL and Hashcat as stated in the FAQ. This didn't change anything in speed. I also rolled back the last Windows Update, which sadly also didn't improve cracking speed. I've also tried older versions of hashcat, with no success.

To be clear, this is not limited to NTLM, I'm getting this behaviour on all hash modes. I just used NTLM as an example here. 

I uploaded the output of trying to crack a single NTLM hash and a benchmark output on gist:
cracking output: https://gist.github.com/githubkuyaya/339...5449d18974
benchmark output: https://gist.github.com/githubkuyaya/dc0...19546e8be3


Does anyone have an idea of what might be the cause of this?
I'm happy to provide more information/outputs if needed.

Missing Frames and hcxpcapngtool

$
0
0
I am using ESP Hash Monster on a M5Stack Core2 to capture wlan packeks. I can easily capture lots of handshakes (all four messages) and occasionaly a PMKID as well. When I attempt to convert these captures to a Hashcat accepted format using hcxpcapngtool, I always get the message that frames are missing.

What exact frames do I need in order to crack a WPA2 PSK? More than the 4-way handshake and/or PMKID?
What exactly is meant by the "total/useless/best" output, and how can the PMKID be both useless and best?

Yes, these questions are not specifically Hashcat-related and they are newb for sure, so I appreciate a nudge in the right direction, or someone to point out what it is I am obviously missing. I've tried to find answers in the documentation but have come up empty so far.

Here is the output from the tool, which includes a four-way handshake, and a PMKID (I think):

summary capture file
--------------------
file name................................: 0001.pcap
version (pcap/cap).......................: 2.4 (very basic format without any additional information)
timestamp minimum (GMT)..................: 31.12.1969 19:29:03
timestamp maximum (GMT)..................: 01.01.1970 09:53:18
used capture interfaces..................: 1
link layer header type...................: DLT_IEEE802_11 (105)
endianess (capture system)...............: little endian
packets inside...........................: 1357
BEACON (total)...........................: 55
WPA encrypted............................: 27
EAPOL messages (total)...................: 1274
EAPOL RSN messages.......................: 1274
ESSID (total unique).....................: 28
EAPOLTIME gap (measured maximum usec)....: 666344089
EAPOL ANONCE error corrections (NC)......: working
REPLAYCOUNT gap (suggested NC)...........: 23
EAPOL M1 messages........................: 1061
EAPOL M2 messages........................: 57
EAPOL M3 messages........................: 116
EAPOL M4 messages........................: 40
EAPOL pairs (total)......................: 83
PMKID (total)............................: 1
PMKID (useless)..........................: 1
PMKID (best).............................: 1

Warning: missing frames!
This dump file contains no important frames like
authentication, association or reassociation.
That makes it hard to recover the PSK.

Warning: missing frames!
This dump file contains no undirected proberequest frames.
An undirected proberequest may contain information about the PSK.
That makes it hard to recover the PSK.


-----

I tried to attach the pcap but the forum doesn't allow them I guess.

AMD RX 6800M benchmark(G15 Advantage Edition)

$
0
0
OpenCL API (OpenCL 2.1 AMD-APP (3276.6)) - Platform #1 [Advanced Micro Devices, Inc.]
=====================================================================================
* Device #1: AMD Radeon(TM) Graphics, 3072/6235 MB (2432 MB allocatable), 8MCU
* Device #2: AMD Radeon RX 6800M, 12160/12272 MB (10431 MB allocatable), 20MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

-------------------
* Hash-Mode 0 (MD5)
-------------------

Speed.#1.........:  4767.8 MH/s (55.15ms) @ Accel:512 Loops:1024 Thr:64 Vec:1
Speed.#2.........: 31663.8 MH/s (41.60ms) @ Accel:256 Loops:1024 Thr:256 Vec:1
Speed.#*.........: 36431.6 MH/s

----------------------
* Hash-Mode 100 (SHA1)
----------------------

Speed.#1.........:  1837.6 MH/s (71.62ms) @ Accel:256 Loops:512 Thr:128 Vec:1
Speed.#2.........: 12376.2 MH/s (53.32ms) @ Accel:512 Loops:1024 Thr:64 Vec:1
Speed.#*.........: 14213.9 MH/s

---------------------------
* Hash-Mode 1400 (SHA2-256)
---------------------------

Speed.#1.........:  723.3 MH/s (91.22ms) @ Accel:128 Loops:1024 Thr:64 Vec:1
Speed.#2.........:  5226.0 MH/s (63.42ms) @ Accel:256 Loops:512 Thr:128 Vec:1
Speed.#*.........:  5949.3 MH/s

---------------------------
* Hash-Mode 1700 (SHA2-512)
---------------------------

Speed.#1.........:  168.1 MH/s (49.13ms) @ Accel:16 Loops:512 Thr:128 Vec:1
Speed.#2.........:  1399.7 MH/s (59.23ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Speed.#*.........:  1567.8 MH/s

-------------------------------------------------------------
* Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095]
-------------------------------------------------------------

Speed.#1.........:    89031 H/s (90.12ms) @ Accel:256 Loops:128 Thr:128 Vec:1
Speed.#2.........:  616.9 kH/s (65.67ms) @ Accel:128 Loops:256 Thr:256 Vec:1
Speed.#*.........:  706.0 kH/s

-----------------------
* Hash-Mode 1000 (NTLM)
-----------------------

Speed.#1.........:  7959.4 MH/s (65.88ms) @ Accel:512 Loops:512 Thr:256 Vec:1
Speed.#2.........: 50889.7 MH/s (25.71ms) @ Accel:512 Loops:1024 Thr:128 Vec:1
Speed.#*.........: 58849.2 MH/s

---------------------
* Hash-Mode 3000 (LM)
---------------------

Speed.#1.........:  4436.7 MH/s (59.10ms) @ Accel:512 Loops:1024 Thr:64 Vec:1
Speed.#2.........: 30734.3 MH/s (42.72ms) @ Accel:1024 Loops:1024 Thr:64 Vec:1
Speed.#*.........: 35171.0 MH/s

--------------------------------------------
* Hash-Mode 5500 (NetNTLMv1 / NetNTLMv1+ESS)
--------------------------------------------

Speed.#1.........:  4849.4 MH/s (54.13ms) @ Accel:256 Loops:1024 Thr:128 Vec:1
Speed.#2.........: 33712.6 MH/s (39.10ms) @ Accel:1024 Loops:1024 Thr:64 Vec:1
Speed.#*.........: 38562.0 MH/s

----------------------------
* Hash-Mode 5600 (NetNTLMv2)
----------------------------

Speed.#1.........:  349.0 MH/s (95.32ms) @ Accel:16 Loops:1024 Thr:256 Vec:1
Speed.#2.........:  2079.0 MH/s (79.93ms) @ Accel:128 Loops:256 Thr:256 Vec:1
Speed.#*.........:  2427.9 MH/s

--------------------------------------------------------
* Hash-Mode 1500 (descrypt, DES (Unix), Traditional DES)
--------------------------------------------------------

* Device #1: Skipping (hash-mode 1500)
            This is due to a known CUDA/HIP/OpenCL runtime/driver issue (not a hashcat issue)
            You can use --force to override, but do not report related errors.
Speed.#2.........:  1118.1 MH/s (73.74ms) @ Accel:32 Loops:1024 Thr:128 Vec:1
Speed.#*.........:  1118.1 MH/s

------------------------------------------------------------------------------
* Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000]
------------------------------------------------------------------------------

Speed.#1.........:  1844.2 kH/s (62.80ms) @ Accel:512 Loops:500 Thr:64 Vec:1
Speed.#2.........: 12555.7 kH/s (93.98ms) @ Accel:256 Loops:1000 Thr:256 Vec:1
Speed.#*.........: 14399.9 kH/s

----------------------------------------------------------------
* Hash-Mode 3200 (bcrypt $2*$, Blowfish (Unix)) [Iterations: 32]
----------------------------------------------------------------

Speed.#1.........:    2587 H/s (94.79ms) @ Accel:32 Loops:32 Thr:8 Vec:1
Speed.#2.........:    28478 H/s (68.27ms) @ Accel:128 Loops:32 Thr:16 Vec:1
Speed.#*.........:    31064 H/s

--------------------------------------------------------------------
* Hash-Mode 1800 (sha512crypt $6$, SHA512 (Unix)) [Iterations: 5000]
--------------------------------------------------------------------

Speed.#1.........:    26253 H/s (58.75ms) @ Accel:128 Loops:512 Thr:128 Vec:1
Speed.#2.........:  189.3 kH/s (67.40ms) @ Accel:512 Loops:1024 Thr:128 Vec:1
Speed.#*.........:  215.6 kH/s

--------------------------------------------------------
* Hash-Mode 7500 (Kerberos 5, etype 23, AS-REQ Pre-Auth)
--------------------------------------------------------

Speed.#1.........: 30794.1 kH/s (67.15ms) @ Accel:8 Loops:1024 Thr:32 Vec:1
Speed.#2.........:  579.9 MH/s (71.37ms) @ Accel:512 Loops:128 Thr:32 Vec:1
Speed.#*.........:  610.7 MH/s

-------------------------------------------------
* Hash-Mode 13100 (Kerberos 5, etype 23, TGS-REP)
-------------------------------------------------

* Device #1: Skipping (hash-mode 13100)
            This is due to a known CUDA/HIP/OpenCL runtime/driver issue (not a hashcat issue)
            You can use --force to override, but do not report related errors.
Speed.#2.........:  521.1 MH/s (79.46ms) @ Accel:512 Loops:128 Thr:32 Vec:1
Speed.#*.........:  521.1 MH/s

---------------------------------------------------------------
* Hash-Mode 15300 (DPAPI masterkey file v1) [Iterations: 23999]
---------------------------------------------------------------

* Device #1: Skipping (hash-mode 15300)
            This is due to a known CUDA/HIP/OpenCL runtime/driver issue (not a hashcat issue)
            You can use --force to override, but do not report related errors.
Speed.#2.........:  105.8 kH/s (63.57ms) @ Accel:32 Loops:1024 Thr:256 Vec:1
Speed.#*.........:  105.8 kH/s

---------------------------------------------------------------
* Hash-Mode 15900 (DPAPI masterkey file v2) [Iterations: 12899]
---------------------------------------------------------------

Speed.#1.........:    3831 H/s (79.85ms) @ Accel:8 Loops:512 Thr:128 Vec:1
Speed.#2.........:    47921 H/s (67.07ms) @ Accel:64 Loops:128 Thr:256 Vec:1
Speed.#*.........:    51751 H/s

------------------------------------------------------------------
* Hash-Mode 7100 (macOS v10.8+ (PBKDF2-SHA512)) [Iterations: 1023]
------------------------------------------------------------------

Speed.#1.........:    46557 H/s (72.93ms) @ Accel:64 Loops:127 Thr:64 Vec:1
Speed.#2.........:  597.7 kH/s (63.12ms) @ Accel:128 Loops:63 Thr:256 Vec:1
Speed.#*.........:  644.2 kH/s

---------------------------------------------
* Hash-Mode 11600 (7-Zip) [Iterations: 16384]
---------------------------------------------

Speed.#1.........:    89297 H/s (83.62ms) @ Accel:32 Loops:4096 Thr:128 Vec:1
Speed.#2.........:  536.6 kH/s (69.06ms) @ Accel:32 Loops:4096 Thr:256 Vec:1
Speed.#*.........:  625.9 kH/s

------------------------------------------------
* Hash-Mode 12500 (RAR3-hp) [Iterations: 262144]
------------------------------------------------

Speed.#1.........:    8256 H/s (61.25ms) @ Accel:8 Loops:16384 Thr:128 Vec:1
Speed.#2.........:    83837 H/s (59.77ms) @ Accel:16 Loops:16384 Thr:256 Vec:1
Speed.#*.........:    92092 H/s

--------------------------------------------
* Hash-Mode 13000 (RAR5) [Iterations: 32799]
--------------------------------------------

Speed.#1.........:    9859 H/s (49.58ms) @ Accel:16 Loops:1024 Thr:128 Vec:1
Speed.#2.........:    66345 H/s (76.20ms) @ Accel:256 Loops:256 Thr:128 Vec:1
Speed.#*.........:    76204 H/s

-----------------------------------------------------------------------
* Hash-Mode 6211 (TrueCrypt RIPEMD160 + XTS 512 bit) [Iterations: 1999]
-----------------------------------------------------------------------

Speed.#1.........:    63065 H/s (61.13ms) @ Accel:128 Loops:128 Thr:64 Vec:1
Speed.#2.........:  395.2 kH/s (50.80ms) @ Accel:256 Loops:64 Thr:128 Vec:1
Speed.#*.........:  458.2 kH/s

-----------------------------------------------------------------------------------
* Hash-Mode 13400 (KeePass 1 (AES/Twofish) and KeePass 2 (AES)) [Iterations: 24569]
-----------------------------------------------------------------------------------

Speed.#1.........:    8263 H/s (81.73ms) @ Accel:32 Loops:512 Thr:128 Vec:1
Speed.#2.........:    51325 H/s (65.74ms) @ Accel:1024 Loops:64 Thr:64 Vec:1
Speed.#*.........:    59588 H/s

----------------------------------------------------------------
* Hash-Mode 6800 (LastPass + LastPass sniffed) [Iterations: 499]
----------------------------------------------------------------

Speed.#1.........:  565.7 kH/s (50.90ms) @ Accel:32 Loops:499 Thr:128 Vec:1
Speed.#2.........:  4135.7 kH/s (59.23ms) @ Accel:512 Loops:124 Thr:128 Vec:1
Speed.#*.........:  4701.4 kH/s

--------------------------------------------------------------------
* Hash-Mode 11300 (Bitcoin/Litecoin wallet.dat) [Iterations: 200459]
--------------------------------------------------------------------

Speed.#1.........:      859 H/s (48.12ms) @ Accel:512 Loops:128 Thr:128 Vec:1
Speed.#2.........:    6453 H/s (51.46ms) @ Accel:8192 Loops:256 Thr:32 Vec:1
Speed.#*.........:    7312 H/s
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>