Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

Brute TrueCrypt password

$
0
0
Is it possible to crack the TrueCrypt volume password?

Encryption Algorithm: AES-Twofish-Serpent
Hash Algorithm: RIPEMD-160
Keyfile was used (which I have).

I tried all passwords I usually use, but none worked.
So basically, I have no clue anymore what it might be.

Can I recover my password with hashcat?
If yes, which options do I have to use?

Many thanks

How to interact with seco files

$
0
0
Hi Guys,

I am looking forward to cracking a exodus wallet seco file ( https://github.com/ExodusMovement/secure-container ) using a dictionary attack(already prepared list with just 5000 phrases).

 As per https://github.com/hashcat/hashcat/issues/3025 support for seco files was added recently and is available in the current beta version. I vaguely remember the ~17 characters of the password, however I forgot the exact variation. Very confident that I can crack it !, but I NEED HELP



I want to know which hash-mode to use and how to interact with these .seco files (I think I need to create their hash, don't know how?) in hashcat.

Regards,

Specific-user666

Rule generater generates unusable rule

$
0
0
Could someone explain the following issue to me?

I did the following command which completed succesfully:

hashcat-6.2.5/hashcat.bin -m 0 -a 0 hashes.md5 wordlist.dic --generate-rules=6000000 --generate-rules-func-min=1 --generate-rules-func-max=30 --debug-mode=1 --debug-file=stats.txt --potfile-disable -o found.txt

The stats.txt file now contains all rules that succesfully found a password.
However a few rules in the stats.txt are unsupported when I put them in a rulefile.

It seems the rules that aren't working have some non-ascii characters.
One example is:

O43 [ 3?A

The question-mark isn't an actual question-mark when looking at the hex:
4f3433205b2033ff41

I assume this is something with formatting, but since rules don't have any --hex parameter I am not entirely sure how to fix this (be able to use it in a rulefile).

I used the latest hashcat release version.

I tried searching the forum, but either my searching skills failing me or no one asked this question before.

OpenCL printf final digest value is wrong

$
0
0
Hey guys, thanks for clicking my question. I the last days i started to dive into the hashcat source code. Currently i am looking a the m01400_a3-optimized.cl kernel. I wanted to debug it a bit by printing the final digest value that is calculated. However, the value that i print is not matching the final hash. The digest values are stored in u32x type, i tried multiple ways to format the value but it never seems to fit the hash.

Am i missing a step? Or how could i print the final hash before exiting the kernel? I would be verry thankful if you could help me out, i will attach a screenshot to show what i mean. My output starts at FINAL - Werte. I changed the kernel m01400_a3-optimized.cl at Line 291.

[Image: W0XUGp4.png]

Error: unknown target CPU 'generic', CPU: AMD Ryzen 5 5600G

$
0
0
When I try to use hashcat to crack the hash value it prompts the following error.

I tried updating a lot and installing the amd app sdk but still no fix.

I'm hoping to get some advice. Please help.


----------------------------------------------------------------------------------------------
┌──
└─$ hashcat -O -m 500 hashps.txt rockyou.txt --force                  255 ⨯
hashcat (v6.2.5) starting

You have enabled --force to bypass dangerous warnings and errors!
This can hide serious problems and should only be done when debugging.
Do not report hashcat issues encountered when using --force.

OpenCL API (OpenCL 2.0 pocl 1.8  Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=====================================================================================================================================
* Device #1: pthread-AMD Ryzen 5 5600G with Radeon Graphics, 2192/4448 MB (1024 MB allocatable), 2MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 15

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Single-Hash
* Single-Salt

Watchdog: Temperature abort trigger set to 90c

clBuildProgram(): CL_BUILD_PROGRAM_FAILURE

error: unknown target CPU 'generic'
Device pthread-AMD Ryzen 5 5600G with Radeon Graphics failed to build the program, log: error: unknown target CPU 'generic'

* Device #1: Kernel /usr/share/hashcat/OpenCL/shared.cl build failed.

Started: Tue Feb 22 22:15:06 2022
Stopped: Tue Feb 22 22:15:06 2022


-----------------------------------------------------------------------------

Virtualization: vmware
Operating System: The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) GNU/Linux Rolling
Kernel: Linux 5.15.0-kali3-amd64
Architecture: x86-64

CPU: AMD Ryzen 5 5600G

hashcat pdf 25400

$
0
0
Hello... Please help
I use hashcat - m 25400 to find own-password; However, the document has an owner password and a user password;I know the user password to open the pdf;

How to specify user password in a hashcat command? Can you give me a case?

Need some questions answ0ered

$
0
0
Hi!

I want to target only 1 bssid-my AP and not a lot of them(others). If I get standard line I get lots of Rogue PMKID fast what is normal, but the file has too may of PMKIDs(my+others).

If I select as target one AP with specific channel which I got from the scan I dont get it. Is the code allright? I dont want to use old way of handshakes.

Code:
hcxdumptool -i wlan1 -o test --filterlist_ap=MAC_adress --filtermode=2 -c 1 --enable_status=64

Or is it a better way to capture multiple PMKID and what tool do I need to seperate 1 large file with multiple PMKIDs into 1 file 1 PMKID?

If I use enable status 64(tested a little interesting) I get update pretty fast, but what is the difference between PMKID and RoguePMKID? Are both all right or are Rogue from other AP?

When I start cracking the hash I get info digests, unique digests and salts. The name of the essid is often default, so in that case could the hash be cracked even if it says that it is salted? What is the difference between those 3? Normally salted one has extra protection, but I want to know if hashcat takes essid or similar and salted ones can be cracked with no extra methods? I mean captured wireless files - hashes with WPA2 protection.


Thank you that would clarify a lot.

Hashcat returning CL_INVALID_KERNEL_ARGS

$
0
0
Attempting to crack my wifi pw (dictionary includes my own, it's more to learn the tool), however I'm getting the above error when I try to run it.  Full error is clEnqeueNDRangeKernel(): CL_INVALID_KERNEL_ARGS  Seems relatively straightforward, the kernel arguments are incorrect, however I'm unsure of how to correct them.

error when running hashcat: "no such file or directory. (null) Bad address"

$
0
0
Hi there! I really hope anyone can help me on this issue.

I am trying to hash a forgotten password somehow get this error the whole time. I tried a lot and tried finding a solution online, but haven't found one yet. 


Khyara@MacBook-Pro-van-Khyara hashcat % hashcat -m 0 -a 0 /Users/Khyara/Desktop/hashcat/hash.txt  /Users/Khyara/Desktop/hashcat/wordlist.txt 
hashcat (v6.2.5) starting

/Users/Khyara/.local/share/hashcat/sessions/hashcat.pid: No such file or directory

/Users/Khyara/.local/share/hashcat/sessions/hashcat.induct: No such file or directory

(null): Bad address

Started: Fri Feb 25 12:49:32 2022
Stopped: Fri Feb 25 12:49:32 2022
Khyara@MacBook-Pro-van-Khyara hashcat % hashcat -m 0 -a 0 hash.txt wordlist.txt
hashcat (v6.2.5) starting

/Users/Khyara/.local/share/hashcat/sessions/hashcat.pid: No such file or directory

/Users/Khyara/.local/share/hashcat/sessions/hashcat.induct: No such file or directory

(null): Bad address

Started: Fri Feb 25 12:49:55 2022
Stopped: Fri Feb 25 12:49:55 2022


I have given the terminal full access and the folder really exists. I tried two ways: drag and drop the folder (first option, gives the whole path) and just write the name (hash.txt, wordlist.txt). If needed to know: installed hashcat through Homebrew.

Any help/suggestions on would be amazing! Thank you!! 


.png   Schermafbeelding 2022-02-25 om 12.58.06.png (Size: 129.37 KB / Downloads: 2)

when entering the hash, I get an error that the module does not exist

$
0
0
при вводе хеша получаю ошибку что модуль не существует

hashcat (v6.2.5-207-gac1997027) запуск

Не загрузить модуль ./modules/module_19400.dll

Начато: Пт 25 фев 21:24:54 2022
Остановлено: Пт, 25 февраля, 21:24:54 2022

.png   unknown.png (Size: 14.49 KB / Downloads: 1)

It's possible to Brute Force DJVU/STOP4 ransomware key ?

$
0
0
I just got visitor DJVU/STOP4 ransomware .ooll to my computer disk. It's possible to Brute Force DJVU/STOP4 ransomware key for decrypt ? or is there have other decrypt solution to get my files back ?

where can i get the drivers? geforce rtx 2060 notebook dch

$
0
0
the nvidia site only has the newest drivers listed but the hashcat main page says i need version 440.64 or older.

i cant find that anywhere. i need it for my windows 10 notebook with nvidia geforce 2060 internal card and must be for dch systems. the file should look like 440.64-notebook-win10-64bit-international-dch-whql.exe. 
 where can i looks for this?

email:hash -> email:pass

$
0
0
im sure this question is asked alot on these forums but how do i change a email:hash file to an email:pass file
my the args i use rn for a dictionary md5 attack is

-m 0 -a 0 -o cracked.txt -r rules/dive.rule hashes.txt wordlist/rockyou.txt --username

is there anything i could add to these args to make an email:hash file to a email:pass file?

thx in advance

Wireless antennas with cable wont work

$
0
0
I am having that issue and spend a lot of time on it and cant fix it, perhaps someone can tell me what I am doing wrong.

I have one simple Tenda and  one ALFA Nha usb modem. If I connect Alfa with 2 original antennas(7-8 dBi) it works like a charm. I want more range and in my country it is hard to get good wlan antenna. So I try DIY method and I bought 1 square one which could be up till 21 dB1.

The problem is if I use cable from my USB model to the antenna there is basically 0 effect, like antenna would not be connected. I tried I cheap 10m cable and 2 modems, it did not work.

I tired multiple cables where i had to add the jacks. Perhaps 1 dont wire them correctly I dunno, I watched tutorials. Do i need some kind of amplifier or what?

I tried 1 old tv antena, big could add a lot of range, but it is not specialized for wlan. Someone told me I could fry modem with DIY antennas or non wlan ones, why is that?

The problem is not the usb connection from notebook to modem and then using antenna with no coaxial cable.

The problem is always if i try to connect coaxial cable(3m) from Alfa usb modem to antenna, it doesnt work.

Photos attached, please help it is driving me nuts.


.jpg   CIMG2573.JPG (Size: 325.27 KB / Downloads: 5)

.jpg   CIMG2577.jpg (Size: 316.16 KB / Downloads: 4)

.jpg   CIMG2574.JPG (Size: 318.98 KB / Downloads: 4)

.jpg   CIMG2578.JPG (Size: 321.72 KB / Downloads: 4)

.jpg   CIMG2575.JPG (Size: 313.45 KB / Downloads: 3)

Can I Edit Hashcat xxxx.restore file

$
0
0
Hello, I need edit  xxxxx.restore file .  Can I edit with  notepad ?

How to crack a bcrypt hash with salt?

$
0
0
Hello! I am learning how to use Hashcat to crack different types of passwords. I hope someone here can help me. I cannot find anything online so I made an account on this forum just to ask this. I have a bcrypt hash with a known salt. How would I go about cracking it? Where do I tell Hashcat I have a salt for it to use? And am I using the right hash mode? I was thinking about using 3200 but not 100% sure it's the right one to use. If you need more information from me to help solve this problem just ask, I'll reply to you.

Example hash for DES 14000 does not crack correctly.

$
0
0
Hi all, 

I am attempting to crack the DES mode 14000 hash (a28bc61d44bb815c:1172075784504605) from https://hashcat.net/wiki/doku.php?id=example_hashes

As per the wiki, the password is supposed to be hashcat1. However, when attempting to crack it with the following command, I get every collision except for hashcat1:

Code:
PS D:\hashcat-6.2.2> .\hashcat.exe -a 3 -m 14000 a28bc61d44bb815c:1172075784504605 ?1?1?1?1?1?1?1?1 -1 ?l?d --keep-guessing
hashcat (v6.2.2) starting...

CUDA API (CUDA 11.2)
====================
* Device #1: GeForce RTX 3090, 23336/24576 MB, 82MCU
* Device #2: GeForce RTX 3090, 23336/24576 MB, 82MCU

OpenCL API (OpenCL 1.2 CUDA 11.2.109) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #3: GeForce RTX 3090, skipped
* Device #4: GeForce RTX 3090, skipped

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 8

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Optimizers applied:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force

ATTENTION! --keep-guessing mode is enabled.
This tells hashcat to continue attacking all target hashes until exhaustion.
hashcat will NOT check for or remove targets present in the potfile, and
will add ALL plains/collisions found, even duplicates, to the potfile.

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 2210 MB

a28bc61d44bb815c:1172075784504605:haribat1
a28bc61d44bb815c:1172075784504605:hashbat1
a28bc61d44bb815c:1172075784504605:haribau1
a28bc61d44bb815c:1172075784504605:hashcau1
a28bc61d44bb815c:1172075784504605:harhcat0
a28bc61d44bb815c:1172075784504605:hashbat0
a28bc61d44bb815c:1172075784504605:harhcau0
a28bc61d44bb815c:1172075784504605:hasibau0
Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Name........: DES (PT = $salt, key = $pass)
Hash.Target......: a28bc61d44bb815c:1172075784504605
Time.Started.....: Wed Mar 02 12:35:26 2022 (26 secs)
Time.Estimated...: Wed Mar 02 12:35:52 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: ?1?1?1?1?1?1?1?1 [8]
Guess.Charset....: -1 ?l?d, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 54101.1 MH/s (11.72ms) @ Accel:128 Loops:1024 Thr:64 Vec:1
Speed.#2.........: 56136.0 MH/s (7.24ms) @ Accel:128 Loops:1024 Thr:64 Vec:1
Speed.#*.........:  110.2 GH/s
Recovered........: 0/1 (0.00%) Digests
Progress.........: 2821109907456/2821109907456 (100.00%)
Rejected.........: 0/2821109907456 (0.00%)
Restore.Point....: 59785216/60466176 (98.87%)
Restore.Sub.#1...: Salt:0 Amplifier:46080-46656 Iteration:0-1024
Restore.Sub.#2...: Salt:0 Amplifier:46080-46656 Iteration:0-1024
Candidate.Engine.: Device Generator
Candidates.#1....: sdqw303q -> x8qmjdwv
Candidates.#2....: sdqo1fpq -> x8qqxqgx
Hardware.Mon.#1..: Temp: 51c Fan:  0% Util: 15% Core:1830MHz Mem:10802MHz Bus:16
Hardware.Mon.#2..: Temp: 53c Fan:  0% Util: 85% Core:1800MHz Mem:10802MHz Bus:16

Started: Wed Mar 01 12:35:24 2022
Stopped: Wed Mar 01 12:35:54 2022

If anyone has any suggestions as to why this may be and how I can fix it, please let me know. I've tried on a couple of other systems with the same results. 

Thanks

question regarding brain and "seed" functionality

$
0
0
playing around with brain again after some time and stumbling about this

https://github.com/hashcat/hashcat/blob/...t-brain.md

Code:
I'll add a standalone hashcat brain seeding tool later which enables you to easily push all the words from an entire wordlist or a mask very fast. At this time you can use the --hashcat-session option to do so with hashcat itself

and this part

Code:
The client calculates the hashcat brain session based on the hashlist entries, to efficiently let a high number of salts work for us. You can override the session calculated with --brain-session, which makes sense if you want to use a fast hash in order to "seed" the hashcat brain with already-tried wordlists or masks.

first question, was this standalone seeding tool ever released?
second question, is this --hashcat-session in the first codeblock a typo? shouldnt it be --brain-session as mentioned in block2?

third question, how is the second codeblock meant, or how to "seed" hashcat brain with already tried wordlist/masks, can someone give an example workflow (command line) for this? -> lets assume i have a hashlist with 1000 md5 hashes (fast), i tried my basic masks a lot of wordlist and was able to crack 999 of them but the last hash kicks ass, i "forgot" to use brain from the beginning, how can i "seed" these allready done work to hashcat brain? or did i get the second block totally wrong?

New to cracking any help appreciated.

$
0
0
What would be the quickest way to crack a password knowing these things about said password..

Password is: 
12 characters long
First portion is a 5 letter word
Second portion is a 4 letter word
Last portion is 3 numbers ranging 100-999

I have created wordlists for the first 2 portions and use a rule for the last but estimated time to crack is 2 days.

Im unsure how I can narrow my lists or if there is anything I should be using that would be easier.

Example passwords to be cracked are as in the following 2 examples:

StripCoop759
PuntsRock846

Any help appreciated

Des operation is very interesting

$
0
0
I use the example a28bc61d44bb815c: 1172075784504605: haribat1 that comes with the software to test. I can generate the value of haribat1, but for several groups of randomly generated examples, I can't get the correct value with hashcat. I know the front and back values to find the middle value. Strange question
Example 1: 0000000000000000000000-- 0000000000000000--8ca64de9c1b123a7

Example 2: 00000000000000000000011 -- 0000000000000011 -- edd2368f64415f33

Example 3: 0000000000000000000033 -- 0000000000000033--57c005c79ccf2bf0
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>