Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7847 articles
Browse latest View live

Nvidia T600 Benchmark

$
0
0
Picked this up for use as a dedicated transcoding GPU. It wont be used for Hashcat, but of course I had to run some benchmarks on it.

Full Benchmark

Quick peek:

Code:
hashcat (v6.2.5-339-gab300310a) starting in benchmark mode

CUDA API (CUDA 11.6)
====================
* Device #1: NVIDIA GeForce RTX 3080, skipped
* Device #2: NVIDIA T600, 3869/3912 MB, 10MCU

OpenCL API (OpenCL 3.0 CUDA 11.6.99) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #3: NVIDIA GeForce RTX 3080, skipped
* Device #4: NVIDIA T600, skipped

Benchmark relevant options:
===========================
* --backend-devices=2
* --optimized-kernel-enable
* --workload-profile=4

-------------------
* Hash-Mode 0 (MD5)
-------------------

Speed.#2.........:  6568.8 MH/s (391.21ms) @ Accel:1024 Loops:512 Thr:512 Vec:1

----------------------
* Hash-Mode 100 (SHA1)
----------------------

Speed.#2.........:  2279.9 MH/s (292.04ms) @ Accel:256 Loops:1024 Thr:256 Vec:1

---------------------------
* Hash-Mode 1400 (SHA2-256)
---------------------------

Speed.#2.........:  974.0 MH/s (342.65ms) @ Accel:64 Loops:1024 Thr:512 Vec:1

---------------------------
* Hash-Mode 1700 (SHA2-512)
---------------------------

Speed.#2.........:  323.5 MH/s (258.12ms) @ Accel:64 Loops:512 Thr:256 Vec:1

-------------------------------------------------------------
* Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095]
-------------------------------------------------------------

Speed.#2.........:  112.7 kH/s (359.44ms) @ Accel:256 Loops:256 Thr:256 Vec:1

-----------------------
* Hash-Mode 1000 (NTLM)
-----------------------

Speed.#2.........: 10837.9 MH/s (242.09ms) @ Accel:256 Loops:1024 Thr:1024 Vec:1

---------------------
* Hash-Mode 3000 (LM)
---------------------

Speed.#2.........:  6392.2 MH/s (207.19ms) @ Accel:2048 Loops:1024 Thr:64 Vec:1

--------------------------------------------
* Hash-Mode 5500 (NetNTLMv1 / NetNTLMv1+ESS)
--------------------------------------------

Speed.#2.........:  6613.1 MH/s (388.30ms) @ Accel:2048 Loops:512 Thr:256 Vec:1

----------------------------
* Hash-Mode 5600 (NetNTLMv2)
----------------------------

Speed.#2.........:  493.8 MH/s (338.36ms) @ Accel:64 Loops:1024 Thr:256 Vec:1

--------------------------------------------------------
* Hash-Mode 1500 (descrypt, DES (Unix), Traditional DES)
--------------------------------------------------------

Speed.#2.........:  264.3 MH/s (316.28ms) @ Accel:64 Loops:1024 Thr:128 Vec:1

------------------------------------------------------------------------------
* Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000]
------------------------------------------------------------------------------

Speed.#2.........:  2795.7 kH/s (415.67ms) @ Accel:256 Loops:500 Thr:1024 Vec:1

----------------------------------------------------------------
* Hash-Mode 3200 (bcrypt $2*$, Blowfish (Unix)) [Iterations: 32]
----------------------------------------------------------------

Speed.#2.........:    8884 H/s (276.43ms) @ Accel:16 Loops:32 Thr:16 Vec:1

--------------------------------------------------------------------
* Hash-Mode 1800 (sha512crypt $6$, SHA512 (Unix)) [Iterations: 5000]
--------------------------------------------------------------------

Speed.#2.........:    50655 H/s (255.29ms) @ Accel:2048 Loops:512 Thr:64 Vec:1

--------------------------------------------------------
* Hash-Mode 7500 (Kerberos 5, etype 23, AS-REQ Pre-Auth)
--------------------------------------------------------

Speed.#2.........:  131.3 MH/s (319.04ms) @ Accel:128 Loops:1024 Thr:32 Vec:1

-------------------------------------------------
* Hash-Mode 13100 (Kerberos 5, etype 23, TGS-REP)
-------------------------------------------------

Speed.#2.........:  127.6 MH/s (328.41ms) @ Accel:128 Loops:1024 Thr:32 Vec:1

---------------------------------------------------------------------------------
* Hash-Mode 15300 (DPAPI masterkey file v1 (context 1 and 2)) [Iterations: 23999]
---------------------------------------------------------------------------------

Speed.#2.........:    18714 H/s (368.54ms) @ Accel:128 Loops:256 Thr:512 Vec:1

---------------------------------------------------------------------------------
* Hash-Mode 15900 (DPAPI masterkey file v2 (context 1 and 2)) [Iterations: 12899]
---------------------------------------------------------------------------------

Speed.#2.........:    10608 H/s (295.27ms) @ Accel:16 Loops:1024 Thr:256 Vec:1

------------------------------------------------------------------
* Hash-Mode 7100 (macOS v10.8+ (PBKDF2-SHA512)) [Iterations: 1023]
------------------------------------------------------------------

Speed.#2.........:  128.2 kH/s (303.16ms) @ Accel:16 Loops:1023 Thr:256 Vec:1

---------------------------------------------
* Hash-Mode 11600 (7-Zip) [Iterations: 16384]
---------------------------------------------

Speed.#2.........:  117.0 kH/s (340.84ms) @ Accel:128 Loops:4096 Thr:128 Vec:1

------------------------------------------------
* Hash-Mode 12500 (RAR3-hp) [Iterations: 262144]
------------------------------------------------

Speed.#2.........:    15838 H/s (321.63ms) @ Accel:32 Loops:16384 Thr:256 Vec:1

--------------------------------------------
* Hash-Mode 13000 (RAR5) [Iterations: 32799]
--------------------------------------------

Speed.#2.........:    11780 H/s (431.78ms) @ Accel:128 Loops:1024 Thr:128 Vec:1

-----------------------------------------------------------------------
* Hash-Mode 6211 (TrueCrypt RIPEMD160 + XTS 512 bit) [Iterations: 1999]
-----------------------------------------------------------------------

Speed.#2.........:    83589 H/s (446.85ms) @ Accel:16 Loops:1024 Thr:512 Vec:1

-----------------------------------------------------------------------------------
* Hash-Mode 13400 (KeePass 1 (AES/Twofish) and KeePass 2 (AES)) [Iterations: 24569]
-----------------------------------------------------------------------------------

Speed.#2.........:    8063 H/s (421.83ms) @ Accel:16 Loops:512 Thr:1024 Vec:1

----------------------------------------------------------------
* Hash-Mode 6800 (LastPass + LastPass sniffed) [Iterations: 499]
----------------------------------------------------------------

Speed.#2.........:  727.8 kH/s (280.42ms) @ Accel:256 Loops:249 Thr:256 Vec:1

--------------------------------------------------------------------
* Hash-Mode 11300 (Bitcoin/Litecoin wallet.dat) [Iterations: 200459]
--------------------------------------------------------------------

Speed.#2.........:    1434 H/s (290.64ms) @ Accel:32 Loops:1024 Thr:256 Vec:1

Started: Fri Mar 18 13:36:48 2022
Stopped: Fri Mar 18 13:42:06 2022

DES 14000 decoding results are not

$
0
0
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 14000 (DES (PT = $salt, key = $pass))
Hash.Target......: 78c5443243159ab1:0000000000000000
Time.Started.....: Sat Mar 19 23:05:33 2022 (0 secs)
Time.Estimated...: Sat Mar 19 23:05:33 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: 44333642?1?1?1?1 [8]
Guess.Charset....: -1 charsets/DES_special/DES_numeral.hcchr, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  954.9 kH/s (4.52ms) @ Accel:1 Loops:1024 Thr:256 Vec:1
Speed.#2.........:  2863.7 kH/s (0.66ms) @ Accel:4 Loops:1024 Thr:256 Vec:1
Speed.#*.........:  3818.6 kH/s
Recovered........: 1/1 (100.00%) Digests
Progress.........: 663552/6250000 (10.62%)
Rejected.........: 0/663552 (0.00%)
Restore.Point....: 645120/6250000 (10.32%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1024
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:0-1024
Candidate.Engine.: Device Generator
Candidates.#1....: $HEX[4433364279465740] -> $HEX[4433364210860410]
Candidates.#2....: $HEX[4433364264022538] -> $HEX[4433364231234558]

Started: Sat Mar 19 23:05:25 2022
Stopped: Sat Mar 19 23:05:34 2022


Use standard expressive value  0000000000000000  Key  4433364261744123  Cipherology 78C5443243159AB1

Decryption 78C5443243159AB1:0000000000000000 Normal value should be 4433364261744123   

hashcat The resulting value is  D36Bau@#    Is it wrong to know why?

hashcat -a 3 -m 14000 test.hash -1 charsets/DES_special/DES_numeral.hcchr --hex-charset 44333642?1?1?1?1 --show

78c5443243159ab1:0000000000000000Big Grin36Bau@#

Cracking unusual format StaticWord-Reverse(Password)-StaticWord

$
0
0
Hi, 

I have an unusual MD5 hash format to try and crack. 
The hash is created by performing the following

md5(StaticWord + Reverse(Password) + StaticWord)

So I require a way to not only generate reversed password candidates, but have a prefix and a suffix to them as well.

Rules permit reversing the candidate password (r) so doing the reverse is straightforward, but I'm not sure how to position the candidates in between the two static words. 

I am planning on using a dictionary for the candidate passwords.

I was able to do the following to brute-force which isn't using a reversed dictionary but is allowing for a prefix and suffix to the password.

.\hashcat.exe -a 3 -m 0 .\AAA-HASHES\md5-reverso.txt "^&#*1234561?a?a?a?a?a?a?a?a1123456@&^%zzz" -O -w 3

Any help would be much appreciated.

Thanks!

Keyspace questions

$
0
0
Good afternoon,

Please excuse me as this is my first post.  I've read about keyspace, specifically from the FAQ page.  However, I wanted to know why there is such a discrepancy with keyspace values.  For example, -m 14000 outputs a keyspace of 34,359,738,368.  In reality, there are 72 quintillion possible combinations for the 8 character DES key.  

Taking something like hashtopolis into account, the entire keyspace gets taken by a single machine because the keyspace produced by hashcat itself is so low.  IE:  8x 3090's does about 450-500 Gh/s in -m 14000, so the hashtopolis assigns it to a single host.  Whereas the true keyspace would allow it to be distributed among several.

So my questions are these:

A)  It seems the "hashcat legacy" had a more accurate keyspace, why did that change?
B)  The hashcat output is 128^5, leaving the the remaining 3 bytes worth of keyspace out (DES is 8 bytes long).  Is that on purpose?  Is it because of the parity bits in DES?

Regards,

Raithe

Can't crack salted hash generated by ruby AuthlogicSha512 library

$
0
0
Hello.

The code to generate it is quite simple:
Code:
[23] pry(main)> Devise::Encryptable::Encryptors::AuthlogicSha512.digest("12345", 20, "y9KxS8uhhfRZErYBb2mA", nil)

=> "2671d2e63de53eX3X2cc38X06fe8d664717Xe7d1afbcf0ebfbd3dbced3541ced7e00c98X0ad78f3fXeff6df26f2bbb1X3e4cae08fb98fc13b72e3Xd7d2c0Xd29"
Hash was obfuscated with "X", as demanded by rules.
This is a SHA512 algorithm, so I tried hashcat like this:
Code:
[code]hashcat -m 1710 "2671d2e63de53eX3X2cc38X06fe8d664717Xe7d1afbcf0ebfbd3dbced3541ced7e00c98X0ad78f3fXeff6df26f2bbb1X3e4cae08fb98fc13b72e3Xd7d2c0Xd29:y9KxS8uhhfRZErYBb2mA"
12345[/code]

But the cracking status is "Exhausted" and 
Code:
hashcat -m 1710 --show "2671d2e63de53eX3X2cc38X06fe8d664717Xe7d1afbcf0ebfbd3dbced3541ced7e00c98X0ad78f3fXeff6df26f2bbb1X3e4cae08fb98fc13b72e3Xd7d2c0Xd29:y9KxS8uhhfRZErYBb2mA"
just show me nothing.
I guess something wrong with salt format, but I couldn't get what was wrong.

help with non-standard characters

$
0
0
помогите с нестандартными символами .
есть такая проблема, как включить символ "€" в атаку по маске?
hashcat.exe -m 13000 -A 3 -1 abcdefghijklmnopqrstuvwxyz € $ 0123456789  HASH  ? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1
на этом входе ничего не происходит. Hashcat не видит €

Struggling with syntax for brute force mask

$
0
0
Hello, first time attempting something like this 

Am currently locked out of an MS Office 2010 document that is encrypted with a password 

I managed to install The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux and use a Python script to get the hash from the document. ($office$*2010*100000*128*16) hash mode 9500. 

I ran hashcat using hash mode 9500 and a dictionary attack using rockyou.txt word list. 

Unfortunately this did not find the password, so I tried to do brute force instead. But the password is likely to be quite long. We think 9 or 10 characters. this will take weeks with my hardware, so I would like to use a mask to reduce the running time. 

What we know:
The password is likely to contain one or two of these 3 words/numbers: review, contract, 2018
The order/position of the word(s)/numbers is unknown
The casing of the words is unknown
It is unlikely that there will be any special characters outside alphabet letters and numbers 2018

I have been reading the documentation on masks but haven't been able to write one in a way that catches everything in my criteria. Is anyone able to help? Many thanks in advance

hanging brain server (deadlock?)

$
0
0
playing around with hashcat brain i stumbled about a hanging brain server

the attack should be finished within 2 hours but after a day it was still saying 2 hours

i had to press enter in my commandwindow showing the hahscat brain-output (see attached picture) it seems brain was hanging for more than 24 hours (the attack is quite simple 8 digits and there where no problems before)


.png   hang.PNG (Size: 82.53 KB / Downloads: 1)

when looking into the github issues i found this one from 01 november 2021 regarding brain

https://github.com/hashcat/hashcat/issues/3016

but it seems no dev has answered to this yet, or maybe this is unrelated

How to triplicate a word or pattern - OpenCL error when 'M 'in rules

$
0
0
I want to do something similar to doubling in a rule using 'd' (doubles the word), I want to triplicate it.
Now I thought this could be achieved by putting the word in memory (M), doubling the word (d) and appending the word from memory (4), so
## rule to triplicate
Md4

However, when I try this rule or the example rule from the rules tutorial 'lMuX084', in each case I get the error:

Cannot convert rule for use on OpenCL device in file rules/0_test.rule on line 1: M6
Cannot convert rule for use on OpenCL device in file rules/0_test.rule on line 2: lMuX084

Does anyone have a suggestion on how to triplicate words using rules without M, or to circumvent the OpenCL device error?

Find salt from hash - password

$
0
0
Hi there !

Need some help, to find the best way for that:

I have the SHA1 hash, i known the password, i have parts of possible salt from hex file

I search what part of file and how is used as salt

Whats the best way to find this ?

Thanks

Android 7 Full Disk Encryption Samsung

$
0
0
Hi,
I forgot the passcode for my old Samsung phone, on which I have turned the Full Disk Encryption on.
I've been looking on the internet for what seems like an eternity but still haven't found a way to be able to crack the password, as I only have 9 password attempts left before reset and no way to get a hold of the hash to give it to hashcat.
I found Forensics tools but as they are only for officers, so in one last attempt I'm trying this forum.

I have not rooted the phone, if that is important.

If anyone has an idea what I could do to extract the necessary files from the phone or has any kind of experience with Android Full Disk Encryption, please take the time to write on this thread

How to pipe words into hashcat in any non 0 attack mode?

$
0
0
I recently discovered the power of using hashcat in combination with piping. Especially handy when combining a list with a small mask appended. For example using a hybrid attack with the mask at the ending that is normally slow, runs beautifully efficient when using --stdout and piping into hashcat attack mode -0.
  
My question is how can one pipe into hashcat when using any attack mode that other than attack mode 0 (brute-force)? For example pipe into a combinator or hybrid attack mode.
Is this possible, and if so how?

Example of what I would like to be able to do:

hashcat -a 1  wordlist1.txt wordlist2.txt --stdout | hashcat -a 7  <input pipe> ?d?d?

Hashcat just stops without any message

$
0
0
Hi Guys I am totally new to this stuff and so far I managed to capture my network but failed to crack it.
I ran this command :
hashcat -m 22000 hash.hc22000 -1 ?u?d -a 3 ?1?1?1?1?1?1?1?1?1?1?1?1

On my laptop this is going to take more then 10 years.
Now I tried this on a specially installed windows 10 on a desktop because my GPU (R9-280X) is not longer supported by Linux.
Under windows with the latest AMD driver the hashcat just stops without any message.
Searching the Internet resulted in finding similar problems but no solutions.

Starting hashcat correctly shows my GPU.
What can I do?

Instantly end the session

$
0
0
Hi, I have a problem with hashcat, when i am starting a session it instantly end do anyone have an idea how to fix the problem?

.png   probleme.png (Size: 41.72 KB / Downloads: 5)

Hashcat is not cracking my own 8 digit wpa2 wifi password.

$
0
0
Hello everyone,
I am a knoob and want you guys help here, i captured 4 way handshake of my wifi through The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali). and then changed the cap file to hccapx format so that hashcat can recognize for cracking purpose, my wifi password is : 11111111. (8 ones by digit) so this should be very easy to crack for hashcat. But it reaches 100% without any luck and at last hashcat message is : exhausted. Can someone explain why ? I spent 4 days reapeating the process but no luck until now. The command i use is on hashcat 6.1 1 and hashcat.exe -m 2500 -a 3 file.hccapx ?d?d?d?d?d?d?d?d.  Please help me

Help for CPU choose 12900KF or 5950x or something else

$
0
0
Hello dear forum members. 


I am looking for new CPU for work on my old Ethereum wallet password. 
Hashcat mode is  15700

Which CPU best for me

intel 12900KF
AMD 5950x

or something else near to price range CPU $1000 
Xeon or  dual  Xeon solution  for me. 

Thank you all.

Speed questions

$
0
0
Hello Guys,
What can I expect of the time needed to crack a hash.hc2200 if the password consists of 8 characters being uppercase and/or numbers.
hashcat -m 22000 hash.hc22000 -1 ?u?d -a 3 ?1?1?1?1?1?1?1?1
Any real results with different video cards?

Suppose in this case it is not cracked, is it possible to extend the search with more options and at the same time 
exclude the previous search in order to save time?

How to skip repeated failed attempts?

$
0
0
As a simple example I'm currently running something like 
Code:
D:\hashcat-6.2.5>.\hashcat.exe -m 14800 myhash.txt --session foo -a 3 ?l
but for my next run I do something with 
Code:
?h
but I see re-attempts at [a-z]. I remember reading somewhere that hashcat can be configured to remember prev attempts so it can skip over them but after looking all over the wiki the closest I found was the potfile which only stores solved hashes it seems

no hashes loaded.

$
0
0
I type this for crack wifi test.

$ hashcat -m 2500 -a 3 --force key1.hccapx ?h?h?h?h?h?h?h?h?h?h


and hashcat say : the plugin 2500 is deprecated and was replaced with plugin 22000.

so I edit and type this.

$ hashcat -m 22000 -a 3 --force key1.hccapx ?h?h?h?h?h?h?h?h?h?h

and hashcat say : no hashes loaded.

how can I fix it? help me.

Cardano-based Bashowap unveils its Multi-Protocol Decentralized Exchange, kicks off p

$
0
0
Bashowap, a Cardano based project, has announced the launch of its innovative development on the Cardano platform. Its goal is to enable swift transactions within the Cardano network. In addition, the decentralized exchange platform will help connect early community members and Cardano developers to shared liquidity and other features.

Bashowap has also begun the private sale of its utility token - $BASH. The $BASH token will be used in different ways, including governance, Farming BASH token, and staking. Furthermore, investors can trade the Cardano token, add liquidity to generate LP fees, and acts as a launchpad for startups. Interestingly, the platform offers early adopters the opportunity to join its private sale whitelist before the project goes public.

$BASH token holders Benefits

Token holders can vote and see proposals on the platform. The platform is structured so that token holder can vote on critical issues regarding the project. Furthermore, $BASH token holders can decide to stake their tokens on the Bashowap platform to acquire more tokens. Besides this, there are also the benefits of farming the $BASH token to earn rewards.

Join the Private Sale

The $BASH token private sale is ongoing, and the platform intends to issue a hundred thousand BASH tokens, which is equivalent to 20% of its total supply. Currently, more than 1300 participants have registered for its private sale whitelist.

Join Bashowap social media for exclusive news and updates and for the whitelist: https://whitelist.bashoswap.finance/

Website: https://bashoswap.finance/

Twitter: https://twitter.com/basho_swap

Telegram:  https://t.me/bashoswap
Viewing all 7847 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>