Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8213 articles
Browse latest View live

New Feature: outfile monitoring

$
0
0
oclHashcat v1.02 will come with a new Feature called outfile-check. Just to explain this new feature shortly:

When we started to add more distributed support with -s and -l and --keyspace we thought that might be enough to motivate people to build 3rd party applications around oclHashcat to make it distributed. And it was true, some people started working on such solutions.

Soon after they started they realized that they are now able to distribute the workload, but what about the results, the cracked hashes. Usually that wouldn't matter if you run BF attack against an unsalted raw hashlist, but it's different when you have let's say a salted hashlist.

If you have a hashlist with 100 salted hashes, the time to process a keyspace is 100 timer longer than with a single salt, that should be clear, right?

oclHashcat has this optimization, if you crack all hashes bound to a specific salt, it marks it as cracked. In that case, it can skip over the test and thus decreasing the total time to complete efficiently. But in a distributed environment, there can be a node that cracked a specific salt completly by cracking all the hashes bound to it, but the other nodes do not know about that and still process that keyspace unnecessarily.

I had the same problem a while back with oclHashcat-lite. It already supported that -s and -l syntax and people started writing distributed systems around it and they originally brought up exactly that problem that if one node cracked a hash (oclHashcat-lite was single hash) how do the other nodes now about it.

This finally end up in the following question: How to inform a running oclHashcat session with the information that a hash that it is trying to crack was cracked by a different node.

We came up with a very easy solution. You just put the cracked hash into your outfile. Then, oclHashcat periodically reads it's own outfile and matches all the cracked hashes against its internal table that tell it which hash and which salt is cracked and which not and updates it.

It's not required, but for example, to automate that process completly all you need to have is a shared folder in which all your distributed nodes can write. Point all your nodes to write into the same outfile in that shared folder. Once a node cracks a hash, it writes into that outfile and all other nodes get informed about that.

There's a new parameter added "--outfile-check-timer" that can be used to configure the period in seconds to rescan the outfile. The default is set to 5 seconds and you can disable it by setting it to 0.

Combo Rule

$
0
0
Just thought I would share my combination rule.
After I had done a lot of hashing I found which rules provide the quickest results. The point of this was for me to have to run the least amount of rules as possible to get the most results as I'm not always at my desk to switch back and forth between rules.

Most people's passwords are not overly complicated so I picked the rules that provides the most results, the quickest way possible.

Rule Order.
1 Best64
2. Pengo's Rule
3. blandyuk Rule
4. D3ad0ne v3
5. Milzo Email's as passwords rule

.txt  1.giveen_combo.txt (Size: 53.86 KB / Downloads: 4)

des hashes

$
0
0
Do you need to use OCL hashcat to crack DES hashes (unix) or can they be cracked in "normal" hashcat?

Can anyone recommenda a good site with some example syntax for a basic wordlist type attack, and how to format the file full of hashes, i.e. username:password.

Crack MD5 & SALT

$
0
0
Hello everybody,

I'm running 2 GPU HD ATI 7970 and 5870 under windows 64bits.

It's my first time that i wan't to see how it works,

so is there any tutorial that i have to follow i must crack a hash it's a hash MD5 salted !

Thank's

mybb password recover

$
0
0
hi,

please if somebody could help me with the command to decrypt mybb forum hash ?

i wan't to use bruteforce using about 2 until 10 charactaire mix.

thank's soo much

hashcat not working...

$
0
0
whenever i run the .exe, it justs closes the program itself......
i see a window pop up for a fraction of a second, then it's gone, what's wrong? ive tried both the amd one and cpu one.....
i have windows 7

2nd GPU very slow

$
0
0
Hello!

I am running oclHashcat 1.01 on Ubuntu 13.10_x64 with the latest Catalyst 13.12-driver. oclhashcat works, but the 2nd GPU ist far too slow.

1st GPU is a 5850 HD, 2nd a 7790 HD.
Code:
Session.Name...: oclHashcat
Status.........: Running
Input.Mode.....: Mask (?a?a?a?a?a?a?a) [7]
Hash.Target....: ***
Hash.Type......: NTLM
Time.Started...: Thu Feb 27 21:01:06 2014 (12 mins, 40 secs)
Time.Estimated.: Thu Feb 27 23:15:39 2014 (2 hours, 1 min)
Speed.GPU.#1...:  7530.0 MH/s
Speed.GPU.#2...:  1176.5 MH/s
Speed.GPU.#*...:  8706.4 MH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 6588427501568/69833729609375 (9.43%)
Rejected.......: 0/6588427501568 (0.00%)
HWMon.GPU.#1...: 95% Util, 67c Temp, 56% Fan
HWMon.GPU.#2...: 95% Util, 67c Temp, 56% Fan

The same hardware does the job well running Windows 7 Prof. x64, thereby the 2nd GPU nearly reaches the speed of the first one. I tried to crossfire both cards and to connect a monitor (via HDMI) to the card with GPU#2. Unfortunatelly no changes :-(

Any ideas?

sha512crypt issue

$
0
0
trying to crack, oclhashcat plus 64 says kernel not found in cache and while building kernel memory size exceed 3.5 GB and system passes away..

epixoip, you dont answer Smile

Trac refuses to take my submission

$
0
0
I currently can't add anything to Trac (I've had no problems until now)

Quote:Submission rejected as potential spam
StopForumSpam says this is spam (username [18.18])

Qu'est-ce le foque?

Here's what I tried to add:

- The R9 290X defaults to a target temperature of 94 degrees (and it's built to run at temps that high)
- oclHashcat defaults to a temp retain of 80 degrees, so will slow down WAY too early.
- ...and it defaults to a temp abort of 90 degrees, so it will unneccessarily abort.

Suggestion: When OD6 is in use, read target temp (T) from GPU (using ADL_Overdrive6_TargetTemperatureData_Get), set default retain to T+1 and default abort to T+2.

Need help with custom charset, WPA

$
0
0
Hi
i want to generate all the possible combinations ..for a pass. Lets say 4 char long,by this ruleWink xyxy where x= a,e,i y=1,2,3,
and we get for "xyxy"type: a1a1,a1a2,a1a3, a1e1,... a2e1,a2e2,a2e3 so on.
Can be done with Mask ? or crunch..or some word generator?
Thanks

hashcat v0.47 --debug-mode=3 Insufficient memory

$
0
0
The Trac just rejected what I typed as spam, so I'll post it here.

Running an old batch file for hashcat v0.47 -g 500 against a directory of 31 word list files got to the 5th file and crashed putting this error message across the screen:

Insufficient memory availableInsufficient memory availableInsufficient memory available

We've discussed this before, and I've removed the debug options from my hashcat batch files, but must've missed that one.

(Win 7 64-bit, 16 GB RAM.)

CFP: Passwords^14 Las Vegas, Aug 5-6

$
0
0
PasswordsCon will be held on Tuesday and Wednesday, August 5th & 6th, at Tuscany Suites & Casino, 255 East Flamingo Rd., Las Vegas. Yes, we are teaming up with BsidesLV and co-locating with them. 2-for-1 conference action - all for the low, low price of FREE!

For the first time we'll expand into 2 tracks, offensive & defensive.

We are looking for tools & techniques on creating, retrieving, cracking, storing, sending & resetting passwords and PINs. Think you have *the* replacement for passwords? Please, challenge us. We'd like to see common japanese passphrases analyzed. Enterprise password management solutions. Adaptive online rate-limiting algorithms for logins & password resets. Visual cryptography passwords. Grammar-based passphrase generators for Russian, Swedish, Arabic and Yiddish. Keystroke dynamics, fingerprint spoofing, you name it. Pretty much anything that has to do with passwords & PINs basically.

Previous speakers at PasswordsCon include:
Jens Steube (Hashcat), Joan Daemen (AES, SHA-3), Dmitry Sklyarov (Elcomsoft), Andrey Belenko (viaForensics), Dmitry Sumin (Passware), Jeremi Gosney, BitWeasil (Cryptohaze), James Nobis (freerainbowtables), Colin Percival (scrypt, Tarsnap), Frank Stajano (Cambridge), Simon Marechal (Openwall), Steve "Sc00bz" Thomas, Simon Josefsson (Yubico), Marco Preuss (Kaspersky), Jeff Goldberg (AgileBits), Jean-Philippe Aumasson (password-hashing.net), Howard Smith (Oracle) - and many others!


** DATES **

We will do 2 rounds of speaker selections, with time to adjust and update topic & contents along the way if needed. Not sure about your speaking capability or contents for a talk? Drop us an e-mail, and lets see if we can help you out. (We've done it before, and we'll do it again!)

CFP release: NOW
CFP round 1 selections: May 1, 2014
CFP closes: June 1, 2014

Our website passwordscon.org will be updated with more information soon, please use the CFP submission form below to email your abstract to us: cfp -at- passwordscon.org.



------------------------------------------------------



** PasswordsCon Las Vegas CFP Submission Form **
** Please fill out this form completely and email to cfp -at-
** passwordscon.org **


Date of Submission:


Name:


Nickname:


Primary Email:


Primary Mobile Number:


If your talk is accepted we can publish your social media information on the speaker page. If you want your information made public so that attendees can contact you or follow your work, please list it here.

Blog URL:
Twitter handle:
Facebook page:
IRC network & nickname:


Have you presented at previous Passwords conferences?


Speaker's Bio (Professional history, achievements, bragging points. Let people know who you are, and why you're qualified to speak on this topic):



Title of Presentation:


Choose your presentation track (offensive/defensive):


Presentation Abstract (max 200 chars):




Presentation Details (max 1000 chars):




Is there a demonstration? (Y/N)


Are you releasing a new tool? (Y/N)


Are you releasing a new exploit? (Y/N)


Is there audience participation / hands-on activities? (Y/N, explain.)


How much time does your presentation require, including Q&A?
(15 minutes, 30 minutes, 60 minutes)


Has this presentation been given in any other venue or conference? (Y/N)


We will provide one LCD projector, a microphone, and an internet connection. Will your presentation require any additional equipment? (Y/N, explain.)


Any special requests for your presentation (sound?)



TERMS AND CONDITIONS
=====================

By submitting you agree to the Terms and Conditions below. Please readd and accept these terms by inserting your name in the appropriate area, otherwise your application will be considered incomplete and returned to you.

1) I warrant that the above work has not been previously published elsewhere, or if it has, that I have obtained permission for its publication, and that I will promptly supply the PasswordsCon committee with wording for crediting the original publication and copyright owner.

2) If I am selected for presentation, I hereby give PasswordsCon permission to duplicate, record and redistribute this presentation; including, but not limited to, the conference proceedings, video, audio, hand outs(s) to the conference attendees for educational, on-line and all other purposes.

3) I will include a detailed bibliography as either a separate document or included within the presentation of all resources cited and/or used in my presentation.

4) I will complete my presentation within the time allocated to me - not running over the time allocation.

5) I understand that PasswordsCon will provide 1 LCD projector feed, 1 microphone, and internet connectivity. I understand that I am responsible for providing all other necessary equipment, including laptops (with VGA output), to complete my presentation.

6) I understand and accept that there is no compensation for presenting at PasswordsCon.

7) I understand that I will be responsible for my own hotel and travel expenses.


I, YOUR NAME HERE, have read the Terms and Conditions and agree to the terms as detailed.

hash of a hash

$
0
0
I have a ripemd160 hash that is the hash of an sha256 hash of plaintext. Is there any way to recover the hex values of the sha256 hash so I can recover the plaintext? To be clear:

1. original plaintext: ???????????? UNKNOWN

2. SHA256 of 1: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx UNKNOWN

3. RIPEMD160 of 2: KNOWN

My question is how to recover the SHA256 hash?

Anyone used with Radeon 7xxx or 8xxx series?

$
0
0
Anyone used oclhasshcat with Radeon 7xxx or 8xxx series? if yes wich one?and how it worked.. speed maybe.
Because i want to buy a laptop with Radeon 8570 2GB (oem) or 7670m, thanks

.cap file with more than one handshake - hccap, split

$
0
0
I got hashcat and oclHashcat working on a Windows machine.
Furthermore I got a .cap file with a few WPA and WPA2 handshakes in there.


Questions:

1)
I can point hc and oclhc to the .cap file and it decrypts.
I thought I had to convert this file to a hccap, isnt this necessary?
How to i convert the file using a windows machine only?

2)
There is more than one handshake stored in the .cap file.
If I point hc to this cap is it decrypting all handshakes or just the first?
aircrack-ng asks me which one to decrypt, hc does not.

3)
How do I split the .cap file with many handshakes into multiple files with only one handshake? (Windows and Linux)


Thanks in Advance

Hashcat wont open.

$
0
0
When I try to open, a cmd window pops up for a second, and then nothing.
What to do?

Error: cuModuleLoad() 301

$
0
0
I have d/l the latest drivers from NVidia as well as oclhc 1.01.

When I run the benchmark I get the following:

Code:
C:\hashcat\cudaHashcat64.exe -b
cudaHashcat v1.01 starting in benchmark-mode...

Device #1: GeForce GTX 750, 1024MB, 1137Mhz, 4MCU
Device #2: GeForce GTX 750, 1024MB, 1137Mhz, 4MCU
ERROR: cuModuleLoad() 301
----

I have reviewed these threads:
https://hashcat.net/forum/thread-531.html
http://hashcat.net/forum/thread-1072.html

The kernels dir does exist in the same directory as cudaHashcat64.exe

Computer:
Win 7 w/ two (2) NVidia GTX 750 GPUs

Am I missing something?

Thanks,
-MSF

Edited to added screenshot as attachment.

.png  2014-03-04_1558.png (Size: 37.21 KB / Downloads: 8)

line break problem

$
0
0
Hello, didn't found a thread that solves my problem.
When I load a hashfile over my command file like:
"oclHashcat64.exe -a 3 abc.hash --outfile=hashes --outfile-format=3 --separator=:"
what char should I use that my output file makes a line break after each solved hash?
example:
hash:plainpw
hash:plainpw
hash:plainpw
...

At the moment the solved hashes are stringed like:
hash:plainpwhash:plainpwhash:plainpw...

thx for help

Very slow WPA cracking on NVIDIA 8500 GT Windows

$
0
0
Hi.

I'm testing oclHashcat 1.01 on Windows running with NVIDIA GeForce 8500 GT, 256MB, 918Mhz, 2MCU, PC: Windows 7 64bit , Intel Core I5-2400 3.10GHZ (4 Cores)

When testing MD5 hashes, I get around 37000 khs which is reasonable and it seems to work smoothly.
But when attempting to run WPA/WPA2 cracking, it seems to be very very unreasonably slow, around 600 H/S, here is my command line and output, any idea ?!?!?, I also tried different --gpu-accel and --gpu-loops but getting the same results for WPA cracking.


C:\>cudaHashcat64 -m 2500 -a3 eapol.hccap ?l?l?l?l?l?l?l?l?l

cudaHashcat v1.01 starting...

Hashes: 1 total, 1 unique salts, 1 unique digests
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: GeForce 8500 GT, 256MB, 918Mhz, 2MCU
Device #1: Kernel ./kernels/4318/m2500.sm_11.64.ptx
Device #1: Kernel ./kernels/4318/markov_le_v1.64.ptx
Device #1: Kernel ./kernels/4318/bzero.64.ptx

[s]tatus [p]ause [r]esume bypass [q]uit =>
Session.Name...: cudaHashcat
Status.........: Running
Input.Mode.....: Mask (?l?l?l?l?l?l?l?l?l) [9]
Hash.Target....: TestAP (00:23:69:1e:38:c8 <-> 48:74:6e:5aBig Grin5:cf)
Hash.Type......: WPA/WPA2
Time.Started...: Wed Mar 05 17:31:36 2014 (6 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 0 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 0/5429503678976 (0.00%)
Rejected.......: 0/0 (0.00%)
HWMon.GPU.#1...: 97% Util, 76c Temp, N/A Fan

[s]tatus [p]ause [r]esume bypass [q]uit =>
Session.Name...: cudaHashcat
Status.........: Running
Input.Mode.....: Mask (?l?l?l?l?l?l?l?l?l) [9]
Hash.Target....: TestAP (00:23:69:1e:38:c8 <-> 48:74:6e:5aBig Grin5:cf)
Hash.Type......: WPA/WPA2
Time.Started...: Wed Mar 05 17:31:36 2014 (13 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 0 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 4096/5429503678976 (0.00%)
Rejected.......: 0/4096 (0.00%)
HWMon.GPU.#1...: 97% Util, 76c Temp, N/A Fan

[s]tatus [p]ause [r]esume bypass [q]uit =>
Session.Name...: cudaHashcat
Status.........: Running
Input.Mode.....: Mask (?l?l?l?l?l?l?l?l?l) [9]
Hash.Target....: TestAP (00:23:69:1e:38:c8 <-> 48:74:6e:5aBig Grin5:cf)
Hash.Type......: WPA/WPA2
Time.Started...: Wed Mar 05 17:31:36 2014 (20 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 601 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 12288/5429503678976 (0.00%)
Rejected.......: 0/12288 (0.00%)
HWMon.GPU.#1...: 97% Util, 76c Temp, N/A Fan

[s]tatus [p]ause [r]esume bypass [q]uit =>

Session.Name...: cudaHashcat
Status.........: Aborted
Input.Mode.....: Mask (?l?l?l?l?l?l?l?l?l) [9]
Hash.Target....: TestAP (00:23:69:1e:38:c8 <-> 48:74:6e:5aBig Grin5:cf)
Hash.Type......: WPA/WPA2
Time.Started...: Wed Mar 05 17:31:36 2014 (23 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 601 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 12288/5429503678976 (0.00%)
Rejected.......: 0/12288 (0.00%)
HWMon.GPU.#1...: 42% Util, 74c Temp, N/A Fan

Started: Wed Mar 05 17:31:36 2014
Stopped: Wed Mar 05 17:31:59 2014

C:\>


Any idea why is it so slow for WPA but for MD5 it runs ok ?

cap files into hash or hex help

$
0
0
any body can teach me how to get hash file i have a cap file but i can hash it.........im using kali linux latest...ill perfectly using command airodump-ng to capture a file i use wordlist ang pentest but im field?
Viewing all 8213 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>