Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

Latest working environment for AMD R9 Fury

$
0
0
Greetings all,

I've got a R9 Fury here, trying to do some hashcat.

I'm on latest Win10 and tried different Driver Versions for compatibility with hashcat 6.2.5, but without success

Adrenalin 21.5.2 Recommended (WHQL): (Latest EOL Driver)
Code:
Unsupported AMD HIP runtime version '0.0.3240' detected! Falling back to OpenCL...

OpenCL API (OpenCL 2.1 AMD-APP (3240.6)) - Platform #1 [Advanced Micro Devices, Inc.]
=====================================================================================
* Device #1: AMD Radeon (TM) R9 Fury Series, 3968/4096 MB (3264 MB allocatable), 56MCU

[...]

* Device #1: ATTENTION! OpenCL kernel self-test failed.

Adrenalin 2020 Edition 21.3.2 Optional: (Latest Adrenalin 2020 Edition, as stated to be compatible on main page)
Code:
Unsupported AMD HIP runtime version '0.0.3224' detected! Falling back to OpenCL...

OpenCL API (OpenCL 2.1 AMD-APP (3224.5)) - Platform #1 [Advanced Micro Devices, Inc.]
=====================================================================================
* Device #1: AMD Radeon (TM) R9 Fury Series, 3968/4096 MB (3264 MB allocatable), 56MCU



[...]

* Device #1: ATTENTION! OpenCL kernel self-test failed.


Adrenalin 2020 Edition 20.9.1 Recommended (WHQL):
Driver gets updated by Windows Update, so output reverts to:
Code:
Unsupported AMD HIP runtime version '0.0.3224' detected! Falling back to OpenCL...

OpenCL API (OpenCL 2.1 AMD-APP (3224.5)) - Platform #1 [Advanced Micro Devices, Inc.]
=====================================================================================
* Device #1: AMD Radeon (TM) R9 Fury Series, 3968/4096 MB (3264 MB allocatable), 56MCU

[...]

* Device #1: ATTENTION! OpenCL kernel self-test failed.

Maybe I need to downgrade hashcat to an older version to get it working? If yes, which one? Should be compatible with AMD-APP (3240.6)


Thanks so far

How to write mask 3DES (14100) PLS HELP

$
0
0
I was write code as 

Code:
hashcat -m 14100 8384156835E8FE5F:4567109414F2C846 -o cracked.txt -a 3 -1 DES_full.charset --hex-charset ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h -w 4 --force

but it displays error as follows

Code:
Integer overflow detected in keyspace of mask: ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h

All so try out 
?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1

But no luck

IM LOOKING TO GENERATE K1 K2 AND K3 Is it possible to generate one single command or We have to first generate K1 and After k2 and K3 ?

My Password length 16

Looking for answer, Thank you

Recover Bitbox password PBKDF2_ROUNDS_MCU = 2048,PBKDF2_ROUNDS_APP = 20480

$
0
0
I am trying to recover a Bitbox wallet password based on a password hash and some knowledge of the password.
I found this old post where Undeath gave some advise on how a Bitbox plain text hash should be hex decoded and base64 encoded and formated for Haschat.
I created as test wallet and attempted to crack it with the know password using the attack mode specified by Undeath and failed.

Undeath gave the following advice based on the original question
"pbkdf2-hmac-sha512 (mode 12100) with 20480 iterations and a fixed salt "Digital Bitbox".

so your hash would look like
sha512:20480:RGlnaXRhbCBCaXRib3g=:[base64-encoded hash]"
https://hashcat.net/forum/thread-9813-post-51446.html

The test wallet was created using this online Bitbox backup code.
https://github.com/digitalbitbox/html_ba...ckup_in.js
https://github.com/digitalbitbox/html_ba.../backup.js

The information on the hashing I found in the code is:

var Crypto = require('crypto');


var PBKDF2_SALT = 'Digital Bitbox',
PBKDF2_HMACLEN = 64,
PBKDF2_ROUNDS_MCU = 2048,
PBKDF2_ROUNDS_APP = 20480;


later in the code the backup seed is hashed which is the format present in the wallet backup:

var hash = Crypto.createHash('sha256')

.update(new Buffer(ui.backupUserEntropy.value, 'ascii'))
.digest()
.toString('hex');
ui.backupEntropy.value = hash;

################################

My questions
1) Does anyone know what the following stands for? I think it is two rounds of hashing, but I am not sure how that would have been done.
"PBKDF2_ROUNDS_MCU = 2048,
PBKDF2_ROUNDS_APP = 20480;"


2) Based on the code, is this indeed pbkdf2-hmac-sha512 (mode 12100) with 20480 rounds as Undeath indicated in his original post?
I am quite certain my decoding hex and base64 encoding is correct and that as such my test hash should have been cracked if the has mode was indeed 12100.

Just to be certain I will share my Python code for the conversion of the hash of the test wallet (that is allowed right?).

import codecs

## SEED/ENTROPY for test wallet with pwd 'test123', seed is always 64 bytes long
seed = '4fcc72e591076ec13ec1adad6daf769fce8217c1307908183f9ebea1b58e9cb2' # Hex format

## Decode Hex, encode base 64 for hashcat
b64 = codecs.encode(codecs.decode(seed, 'hex'), 'base64').decode()
## b64 = T8xy5ZEHbsE+wa2tba92n86CF8EweQgYP56+obWOnLI=

The results test hash is:
sha512:20480:RGlnaXRhbCBCaXRib3g=:T8xy5ZEHbsE+wa2tba92n86CF8EweQgYP56+obWOnLI=

NVAPI_ERROR

$
0
0
Hello everyone!
I try to start hashcat (wordlist brutforce) on my rig (win server 2019 with 10 of RTX 3080ti) and it crashes after about 10-20 minutes with unknown error.

I tried:
1. Upgrade/Downgrade nvidia drivers;
2. Downgrade hashcat version (all down to 6.2.0);
2. Expand swap file up to 120 GB;
3. Use different mods (-w option) doesn't impact;
4. Use different wordlists (100 and 400 GB);
5. Use different hashtypes;

Any other conditions:
- Windows server 2019
- RAM 64GB
- Intel core i7 7700k
- NVIDIA EVGA RTX 3080ti (10 devices)
- ETH miner works stable
- Any of 7 cards works stable. The problem start with 8th device
- Temp max 60 C
- Don't use any boost. Just default settings.



Thank you for any help!

hashcat output below:

[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => NvAPI_GPU_GetPerfPoliciesStatus(): NVAPI_ERROR

nuLaunchKernel(): unknown error  UcuLaunchKernel(): unknown errorcuMemcpyHtoDAsync(): unknown error known Error

cvmlDeviceGetUtilizationRates(): UnvmlDeviceGetUtilizationRates(): Unknown Error


nvmlDeviceGetUtilizationRates(): Unknown Error

nvmlDeviceGetUtilizationRates(): Unknown ErrornvmlDeviceGetUtilizationRates(): U


nvmlDeviceGetUtilizationRates(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

cuMemcpyDtoHAsync(): unknown error

cuMemcpyDtoHAsync(): unknown error

nvmlDeviceGetFanSpeed(): Unknown Error

Session..........: hashcat
Status...........: Error
Hash.Mode........: 20 (md5($salt.$pass))
Hash.Target......: C:\hashcatgui\hashcat\hashes\test.txt
Time.Started.....: Wed Mar 09 11:46:21 2022 (13 mins, 15 secs)
Time.Estimated...: Wed Mar 09 12:24:39 2022 (25 mins, 3 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (D:\files\list.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  5354.7 kH/s (0.36ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#2.........:  5396.1 kH/s (0.32ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#3.........:  5472.6 kH/s (0.29ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#4.........:  5436.7 kH/s (0.38ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#5.........:  5002.4 kH/s (0.60ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#6.........:  5283.0 kH/s (0.66ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#7.........:  5344.5 kH/s (0.56ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#8.........:  5120.5 kH/s (0.38ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#9.........:  5220.3 kH/s (0.48ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#10.........:  4995.7 kH/s (0.57ms) @ Accel:1024 Loops:1 Thr:32 Vec:1
Speed.#*.........: 52626.5 kH/s
Recovered........: 0/3 (0.00%) Digests, 0/3 (0.00%) Salts
Progress.........: 41625845760/120741743394 (34.48%)
Rejected.........: 0/41625845760 (0.00%)
Restore.Point....: 13738967040/40247247798 (34.14%)
Restore.Sub.#1...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#2...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#3...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#4...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#5...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#6...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#7...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#8...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#9...: Salt:2 Amplifier:0-1 Iteration:0-1
Restore.Sub.#10...: Salt:2 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....:  ->
Candidates.#2....:  ->
Candidates.#3....:  ->
Candidates.#4....:  ->
Candidates.#5....:  ->
Candidates.#6....:  ->
Candidates.#7....:  ->
Candidates.#8....:  ->
Candidates.#9....:  ->
Candidates.#10....:  ->
Hardware.Mon.#1..: Temp: 52c Core:1950MHz Mem:9242MHz Bus:1
Hardware.Mon.#2..: Temp: 51c Core:1859MHz Mem:9242MHz Bus:1
Hardware.Mon.#3..: Temp: 51c Core:1948MHz Mem:9242MHz Bus:1
Hardware.Mon.#4..: Temp: 54c Core:1979MHz Mem:9242MHz Bus:1
Hardware.Mon.#5..: Temp: 51c Core:1933MHz Mem:9242MHz Bus:1
Hardware.Mon.#6..: Temp: 46c Core:1933MHz Mem:9242MHz Bus:1
Hardware.Mon.#7..: Temp: 50c Core:1964MHz Mem:9242MHz Bus:1
Hardware.Mon.#8..: Temp: 51c Core:1933MHz Mem:9242MHz Bus:1
Hardware.Mon.#9..: Temp: 49c Core:1799MHz Mem:9492MHz Bus:1
Hardware.Mon.#10..: Temp: 54c Core:1999MHz Mem:9242MHz Bus:1
cuMemFree(): unknown error

cuMemFree(): unknown error

cuMemFree(): unknown error

cuMemFree(): unknown error

cuMemFree(): unknown error

cuMemFree(): unknown error

cuMemFree(): unknown error

bcl password

$
0
0
i want read code from .bcl file.

can help ?

Russian Wordlist / Dictionary File

$
0
0
Hi, as you can guess from the title: Could anybody share or link a recommendable wordlist or dictionary file for the Russian language?

Hcxdumptool EAPreq example?

$
0
0
Are there any examples on how to use the --eapreq option in hcxdumptool? If I wanted the order to be similar to EAPHammer's "balanced" order, the Phase2 order would be GTC,MSCHAPV2,TTLS-MSCHAPV2,TTLS,TTLS-CHAP,TTLS-PAP,TTLS-MSCHAP,MD5, ending with a Failure. Besides RFC3748, I have trouble finding a list of the type-data values for these, and how to write them out in the using the --eapreq option. Any examples?

when entering the hash, I get an error that the module does not exist

$
0
0
при вводе хеша получаю ошибку что модуль не существует

hashcat (v6.2.5-207-gac1997027) запуск

Не загрузить модуль ./modules/module_19400.dll

Начато: Пт 25 фев 21:24:54 2022
Остановлено: Пт, 25 февраля, 21:24:54 2022

.png   unknown.png (Size: 14.49 KB / Downloads: 1)

hashcat fails to start on Windows 11 - error on OpenCLOn12.dll

$
0
0
Hello,

I am having this issue starting hashcat, it freezes upon start and I get this in the event logs.
I have tried installing a different version of Microsoft OpenCL and OpenGL Compatibility Pack but I get the same result.

GPU : Nvidia GeForce RTX 3050 Laptop GPU
Driver Version : 511.79

Faulting application name: hashcat.exe, version: 0.0.0.0, time stamp: 0x62274b67
Faulting module name: OpenCLOn12.dll, version: 0.0.0.0, time stamp: 0x618d36bf
Exception code: 0xc0000409
Fault offset: 0x00000000000e429d
Faulting process id: 0x2e1c
Faulting application start time: 0x01d834331d42392d
Faulting application path: c:\Tools\hashcat-6.2.5+308\hashcat-6.2.5\hashcat.exe
Faulting module path: C:\Program Files\WindowsApps\Microsoft.D3DMappingLayers_1.2112.2.0_x64__8wekyb3d8bbwe\x64\OpenCLOn12.dll

Getting previous router password when cracking

$
0
0
I've been trying to crack my home WiFi passwords for my final year project at university. When hashcat has finished cracking the password, the password that is revealed is not the current password for the router I am trying to crack, but instead a previous one. Any help ?

$100 credit with linode vps going to try cracking my electrum

$
0
0
my 0.0123btc now seems worth cracking, gpu's are in pieces so i noticed https://www.linode.com/docs/products/com...t-started/ 


[size=1]Dedicated 128 GB + RTX6000 GPU x4
$4000
$6.00
128 GB
[/size]


got $100 credit!


was to launch an irc bouncer and some testing but then i noticed they rent gpu 

dedicated 128GB+RTX6000 GPU (4 of them as a package) for $6 an hour.

whats the most i can get out of this to get it sucesfull? should i use https://github.com/sc0tfree/mentalist its a electrum wallet with version 11 i believe,

the xpub is visible and 4 transactions, the xprv and seed is base64 encoded of some bytes
[size=1]Dedicated 128 GB + RTX6000 Ggot[/size]

Combine CPU and GPU for cracking?

$
0
0
Hello. I just recently found out about using an intel cpu for cracking and I was wondering if there might be a way to run an intel cpu and an nvidia gpu simultaneously to speed up a crack?

ssh mode 22921 ($6$) token length exception

$
0
0
Hello.
I have a problem while trying to crack an ssh hash with mode 6. I've also tried the beta version with no success.
The corresponding hash is:
Code:
$sshng$6$16$a967fe6f59f545c49fdaa934a5c438f5$1926$6f70656e7373682d6b65792d7631000000000a6165733235362d637472000000066263727970740000001800000010a967fe6f59f545c49fdaa934a5c438f5000000100000000100000197000000077373682d727361000000030100010000018100c99433df07a959383018408b8424b7be3feb664b003c24f7575849213a9e89b34f83de3bdb68e082ea861fd1fe1111edeec6ca37233d0bfc5cef2f4d3f0bd8fb0217d8a1788972cbbefc309aaeda6443e25b1d9950af2c86d5dcfc0f0897a32c82864a1987daf125600eb80ad8117670a7ce3072ebbcf8f2cead3653d72e9fd5f5eaa61cd7b2ccb68e91a7ff0aed820e6013b0b8cdb9cb78270d3441471de38b2a637f39922c9198dd7ccd93676153774306c2ebec329f957d8c1e480a2729943ab38008fabab1422f132b57481d6fb37eee50c847eb18741a1020f074d8a7c361da5ce13ff83a8e9cfe3c5295a7750d8cf3405d5cb38a5cf8540ad926bb6a8371daf658acea12474a6616dcdad7c340a183f0f880a10591dc4b4aaca1db45f9ccc2d20331df5f8bf2b23b10f3010ff2ae7f0b6c03e75d7793e1d6f4963f3cce4cdecfbfee9602e3f9515f7bf7eae54f505bd5f254b683c3b55fac287af41244955f128c084a81b734e059b72889c48c8642077fb86f366aeecf00d706b28061000005a0c27ad73fe928591eebf284cee088f047a49f9fc71f379d308899d1e19d29a922b7954a8184d915f2132ef2c0709a1912240e4a8207699b47421e002c34357029a49fc60a4fa301ca468e74fe0c3c0b2187967e71a3a6f73a300a5447a0576039fdb5d8e0e27bc35c08362df03f160fe270b12300d112aeda8dadc31684ca4492228a83c6a094cdfcd131f880b26e78e1147d48f01f8356fc9df44d3fcc7cdfeb7f31d9424be1ba64216155b07c58eb061fdc8855d73a57b95be2562709dbe06ec1539cd2976a2968e2ffb926850e21f6e8792534e5601cbd9f9e2be08b83be45c213c342a1a7a61e7d7cc2e1b9e09351b19f99e67182c56b033440345b7ad747ed9ce51ae0cd1affe6d75134e938a4ef2ef01de0d1aec67666814ec97e8147d58a03e7a536a2c2440442a60ffe4b235a76d8c05bb90405a71648e6b0c93a74a2ff007acf4a9c5da000f1b897341c0a6a636c4e7a4bb622d25e2d86dd6d9d6c536f55f3f8a43e9e85c49bcd53478a49bc51cb4f98017386fc843575e2148fdc26e8d90ec78955703b43f6bcae25dc60d10a8945c4103c9469dd0b7a54765fbfe6dd941eeb902a91018af036ded44853ee1a4070976d4ee3f429c7d47835bdf2a00de65c1cdb5da3274140fbc2db291b6138c3eb2733cf201d98c4c7b944cb3dfd27904a6e081dc1eb21ad0ef90690d6506c11d90d683a75db243db50d3171d8c6beeb6863ca72429f29f4026d008e9ae4d179ca02cd95fcb310a7d1230a3ddcf118a52a1935e6813bdc5b442f755ca756648d04f4b9629b81f3801f5a2777372759724fc73aec10d470d98dd777442421d2de5878edfca6b8da91e9ef18a35c7970fe2448f8e31f2f73d5e97768a8e5abf4c392fa3bc1893f8bc313e468b3421148282b8b5c33f867acad834da4bf034b719682b3f491c12e93313e115ca5849e693a618bd6bbe87d48c1b548027a291ae2f4264cde6bd85273096ffc8f483e41eb257e53572f5609e2a54093cbc894a770ade3d0d3d6c45f0a69626704180946c64fca9c2f3279574d850ced8843099904d81ec1a5c8d8ac6076f12ce798faf53bb302470d7015826ebb1d5f018886f61e7e24e043c845e958bf994c41208936d513ed87cc02057e911b58212f86109f4b6941d61297f461ea18f67e0fce5fb6dc5f029dac9354cf1de659c39a448adc40ddca9dfd25f00ea845a9f736ed832c57871530dd95eb7cbe8d678f38e03f6fd9dc95b560739fe1c08b66cee8c97e2671e6ef7d0ed466f8b4fa6c9a651725094c471671809536791c12922ef8e247b4b752d342d5ac138315802d36f2f478a397c8a07a66e5686431ad8a12114ba521146f11a188cbd066b1ac91c53b3ccd8c9d4edc950605522fec08794e45b8f1570d8a542477bfe5bd4897d3cd4a47a58d6669147199d6c4e4faebdecc673001cbd8d968f768e7215ec97ad7c74a5461d14a9e4024967581cde44b8be606b02dc7855e67c43351ebb1ac713de36ca38409ff14e13f35eb37ebaea6f99fcfc3f04eb4baf7169f85e58137146556128cc47665753010236a329df2438ebff45ef25ce42f9815a5b9397dea6e69f23c8bb06b7c7fe903c44a695f088cd8d0f49c5f8669c11f7be852acae180ef05221dc1c9a060f025e2ccc876bfd6844828e41cc86d608c55ccddec70b233512a9920604619fa8c16fbc799ebed8c80ad07626df7170463e7af943c5a380d9f768a83ca9ae3d70789abc2d911b795c7c38c5b40856d9496e1419e9ab68415d879b3ce937c46299e20e8f70a123c4080b6bd4ae129c873098ba2e737b48d3b9d58905ebf080476ad12ac4126620e6044d582319b63c36367b4f19bf59e711d0ba534f7db8edec1a9795011a9aecb113a5a06a2967e40f1429f38a68910457c59c075b0d3f1f607b8ce922ea0e37eab4be331b8f4acf5d79a0c925d2d1f6a9ec25d39cdc9e7d2145d564548af916bd3cb4d0fcd8b660bb7732ac293c7cc0fe86e230719197d72211fb29e7c58b54bbfc23c6f144419d$16$486
It's pretty long compared to the version in the example page. It's the output of ssh2john.py.
hashcat throw me:
Code:
Hashfile 'id_rsa.hash' on line 1 ($sshng...9e7c58b54bbfc23c6f144419d$16$486): Token length exception
with the command:
Code:
hashcat -a 0 -m 22921 id_rsa.hash ~/wordlist
If anyone has suggestion. Does it's say me this because of dollars at the end of the hash?
Thanks you!

Problem with Nth instance of character

$
0
0
Hello,

I've a problem with my syntax of nth instance of character.
This is my code :
hashcat -a 0 -m 0 hash.txt demonstration.dict -r test.rule --stdout

hash.txt containt MD5 hash of "pas$word"

demonstration.dict contain only one word : password

test.rule containt only this rule : %1s Dp ip$

I want to discover "pas$word" of hash. rule "ss$" replace all instance of 's' and give pa$$word.

nth instance of character rule is the solution with "%1s Dp ip$"

but when I execute : hashcat -a 0 -m 0 hash.txt demonstration.dict -r test.rule --stdout
I've got an error : No valid rules left

Any idea ? I use the last version 6.2.5
Thanks for reading and help me please.

Nth instance of character

$
0
0
Hello,

I've a problem with my syntax of nth instance of character.
This is my code :
hashcat -a 0 -m 0 hash.txt demonstration.dict -r test.rule --stdout

hash.txt containt MD5 hash of "pas$word"

demonstration.dict contain only one word : password

test.rule containt only this rule : %1s Dp ip$

I want to discover "pas$word" of hash. rule "ss$" replace all instance of 's' and give pa$$word.

nth instance of character rule is the solution with "%1s Dp ip$"

but when I execute : hashcat -a 0 -m 0 hash.txt demonstration.dict -r test.rule --stdout
I've got an error : No valid rules left

Any idea ? I use the last version 6.2.5
Thanks for reading and help me please.

question regarding brain and "seed" functionality

$
0
0
playing around with brain again after some time and stumbling about this

https://github.com/hashcat/hashcat/blob/...t-brain.md

Code:
I'll add a standalone hashcat brain seeding tool later which enables you to easily push all the words from an entire wordlist or a mask very fast. At this time you can use the --hashcat-session option to do so with hashcat itself

and this part

Code:
The client calculates the hashcat brain session based on the hashlist entries, to efficiently let a high number of salts work for us. You can override the session calculated with --brain-session, which makes sense if you want to use a fast hash in order to "seed" the hashcat brain with already-tried wordlists or masks.

first question, was this standalone seeding tool ever released?
second question, is this --hashcat-session in the first codeblock a typo? shouldnt it be --brain-session as mentioned in block2?

third question, how is the second codeblock meant, or how to "seed" hashcat brain with already tried wordlist/masks, can someone give an example workflow (command line) for this? -> lets assume i have a hashlist with 1000 md5 hashes (fast), i tried my basic masks a lot of wordlist and was able to crack 999 of them but the last hash kicks ass, i "forgot" to use brain from the beginning, how can i "seed" these allready done work to hashcat brain? or did i get the second block totally wrong?

ignore some byte des

$
0
0
hey

hashcat.exe -m 14000 1111111111111111:1111111111111111 -o cracked.txt -a 3 -1 C:\Users\omair\OneDrive\Desktop\hashcat\charsets\DES_full.hcchr --hex-charset ?1?1?1?2?1?1?1?3 -w 4 --force

hey i want to ignore some byte from the result any help
for example
                                         
hashcat.exe -m 14000 1111111111111111:111111xx111111xx -o cracked.txt -a 3 -1 C:\Users\omair\OneDrive\Desktop\hashcat\charsets\DES_full.hcchr --hex-charset ?1?1?1?2?1?1?1?3 -w 4 --force

when hashcat set ket in 1111111111111111 
                                                              44  88
 i need the result check without this 4 byte (XX,XX)

thank you

How to Hashcat Resume from Restore point

$
0
0
my code is 
Code:
hashcat -m 14000 hash.txt -o cracked.txt -a 3 -1 1.charset --hex-charset ?1?1?1?1?1?1?1?1 -w 4 --force

my restore point is
Code:
restore point 10308157440 / 34359738368 30.00%

Pls any one can help me to write code resume from above restore point ??

thank you

Hashcat RTX 3080 Performance issues (Windows)

$
0
0
Hello Everyone,


I'm experimenting with hashcat (v6.2.5) on Windows cracking “bcrypt $2*$, Blowfish (Unix)” hashes, but I feel like my hashrate is really slow on RTX 3080.

Is this hashrate correct for this GPU (350 H/s (67.98ms) @ Accel:64 Loops:128 Thr:24 Vec:1) ?

#######################################################################

hashcat-6.2.5>hashcat.exe -m 3200 hash.txt rockyou.txt -w 3 -a 0 -O
hashcat (v6.2.5) starting

CUDA API (CUDA 11.6)
====================
* Device #1: NVIDIA GeForce RTX 3080, 9106/10239 MB, 68MCU

OpenCL API (OpenCL 3.0 CUDA 11.6.110) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #2: NVIDIA GeForce RTX 3080, skipped

Kernel ./OpenCL/m03200-optimized.cl:
Optimized kernel requested, but not available or not required
Falling back to pure kernel

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 72

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 6 MB

Dictionary cache hit:
* Filename..: rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>

Session..........: hashcat
Status...........: Running
Hash.Mode........: 3200 (bcrypt $2*$, Blowfish (Unix))
Hash.Target......: $2y$13$XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Time.Started.....: Fri Mar 18 16:57:41 2022 (23 secs)
Time.Estimated...: Sat Mar 19 04:19:59 2022 (11 hours, 21 mins)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:      350 H/s (67.98ms) @ Accel:64 Loops:128 Thr:24 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 7680/14344385 (0.05%)
Rejected.........: 0/7680 (0.00%)
Restore.Point....: 7680/14344385 (0.05%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:2944-3072
Candidate.Engine.: Device Generator
Candidates.#1....: somebody -> sassy123
Hardware.Mon.#1..: Temp: 57c Fan: 30% Util:100% Core:1964MHz Mem:9242MHz Bus:16

3DES Mask Attack

$
0
0
I need help finding a mask for my key


3DES KEY
5CE21B8AF31407B031CD382DB1C098CC

K1
5CE21B8AF31407B0

K2
31CD382DB1C098CC

K3 = K1

5CE21B8AF31407B0

K1 K2 K3
5CE21B8AF31407B031CD382DB1C098CC5CE21B8AF31407B0

how do i put the mask for k1 to be equal to k3, so i would have to find only k1 and k2
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>