Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8244 articles
Browse latest View live

{x-isSHA512, 15000} support for SAP's 10300

$
0
0
Hi,
I am trying to crack an SAP CODVN-H hash (PWDSALTEDHASH) of type:{x-isSHA512, 15000}.
The hashcat does not seem to recognize this format and I am getting the "Signature unmatched" error.

The {x-isSHA512, 15000} is currently the standard for all new installations.
-> does anyone know if this is supported by hashcat ?

I found only articles on cracking {x-issha, 1024} and that works fine.

Cheers,
JPC

Im trying to recover my old btc.com wallet using the recovery seed

$
0
0
Im trying to recover my old btc.com wallet using the recovery seed
if anyone can help Im ofering a reward
ig: @Yahia_Gueddoud

How does association attack works?

$
0
0
Could someone tell me how exactly does the association attack mode works?
I know how salts work.
My question is directed towards the approach or the technique -a 9 uses.
For example: I generate a single, totally random password with ```mkpasswd -m md5crypt``` without looking at the keyboard.
If I try to crack this hash with -a 0, using the rockyou wordlist (which contains 14,344,385 candidates), then the total number of candidates Hashcat will have to try is going to be (without any rules) exactly 14,344,385 candidates.

Now, if I generate another md5crypt hash like this, and put it into -a 0 again, the candidates will double: 28,688,770
I understand why. What I don't understand is how does the association attack deal with this? I know that this mode should be used with slow hashes, like bcrypt, scrypt or other password hashing algorithms, but how can it decrease the time it takes to crack hashes like those?

I read some explanations, and they said: "This subtle difference can cause a dramatic impact on the overall speed of the process because the -a 9 implementation removes the loop, which iterates through the different salts"

What loop is the above text talking about?

I just don't get it. It would be really awesome if someone helped me understand this whole attack's concept by explaining it, like step by step or extremely simplified.🤞

How can i find the number of rounds in sha512(-m 1700).

$
0
0
The default number of rounds is 80, but I can't find that in the code. And is the hash value below the hash value of “hashcat”? I would appreciate it if you could let me know.

static const char *ST_PASS        = "hashcat";
static const char *ST_HASH        = "82a9dda829eb7f8ffe9fbe49e45d47d2dad9664fbb7adf72492e3c81ebd3e29134d9bc12212bf83c6840f10e8246b9db54a4859b7ccd0123d86e5872c1e5082f";

How to store a list of hashed values?

$
0
0
I'm a newbie. Sorry for posting questions frequently.

>> hashcat -a 0 -m 8900 scrypt_hash.hash example.dict 

I understand that when executing the scrypt algorithm, it operates by hashing dictionary values( example.dict) and comparing them with the correct answer. Is there a way to separately store a list of hashed dictionary values created during execution?

I want to make that list into another dictionary that goes as input to another algorithm. It would be great if it was possible with a command, but if not, I would appreciate it if you could tell me which part of the code to look at.

how i can fx this error

$
0
0
hello guys 
When I start the program, it works fine for a few hours, but then it gives this error
how i can fix that ?
my rig config is 
10 3080 TI
32 gig ram 

what is beast suggest for os ? i use ubuntu 22.04

[Image: photo-2024-05-06-08-09-35.jpg]

I just want to recover my wallet.

$
0
0
I have a old wallet recover json file which I used 7 years ago. But I can't remember which wallet I used...
So I need your help to recover my wallet.

{"encseed":"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","bkp":"de1e7d64c3dc0ebfa9bf5ab794e32db0b6b5c7bf560ba50982d4ad34d7e4f7cd","ethaddr":"b5fa8184e43ed3e0e8ab91216461b3528d84fd09","btcaddr":"1KRNMRxGQWZGqBSVWcGFMFXjWpoeJn5QXu","email":"groundroc...en@gmail.com"}

Above content is json's one.

hashcat multiprocessor

$
0
0
I wonder if Hashcat can work in a multiprocessor environment and can you tell me what I need to do to run it in MP environment?

What cloud provider do you use for hashcat?

$
0
0
From what I can tel it’s against most providers ToS even if it’s for educational purposes or your own hash. Linode will only give you GPU after being a paying customer for several months and you have to request to have an upgrade in what you can run - you can’t just pay premium for a month and use it.
I often hear online that if dictionary attacks aren’t working or you want to try brute forcing that you just use cloud GPU but it’s not clear who actually allows it. Is there a provider that explicitly allows it and is known like how Mullvad allow crypto payment, or do you just contact them all? How you did you find your cloud provider for using tools like hashcat?

building 4x 4090 rig

$
0
0
I am currently using 2x 4090 rig which is simply attached via PCIex 4.0 and 5.0 slots. I suppose both x16. 

 planning to reassamble those GPUs into 4x 4090 rig on minig motherboard. 


I have question, especially to people who have 3090 rigs.  Is it so important , that GPUs will be connected via PCIex x1, will it result in great speed loss ? 
Or I could connect them via PCIex X1 and use for hashcat with no problem ?


P.s using 2x 4090 for hashcat mode 400 for long time, and totally satisfied with it

PCI lane speed for fast GPUs

$
0
0
Does the PCIe lane speed affect hashrate for wordlist attack? I mean 1x 4x 16x  for 3090\4090 gpu
I suppose the do no matter for mask attack , as all the job is done on GPU, but how it affects large wordlist attack?

Separator Unmatched

$
0
0
Separator Unmatched

I don't know if my Hash format is corrert or not. Check the attachments zcbgfrnjha.txt & error.jpeg

I am trying to unlock an encrypted rar file. 

[Image: FK9JZkp]

Please help.

.jpg   error.jpg (Size: 428.4 KB / Downloads: 2)

Hashcat getting exhausted even 100%

$
0
0
OpenCL API (OpenCL 3.0 PoCL 5.0+debian  Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-haswell-12th Gen Intel(R) Core(TM) i7-1250U, 2822/5709 MB (1024 MB allocatable), 12MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force
* Raw-Hash

ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Host memory required for this attack: 3 MB

Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 1000 (NTLM)
Hash.Target......: 04a6c24c2d5f4a4a16413549a0f1e82e
Time.Started.....: Thu May  9 17:51:20 2024 (0 secs)
Time.Estimated...: Thu May  9 17:51:20 2024 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: ?d?d?d?d?d?d?d [7]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 57958.8 kH/s (2.96ms) @ Accel:512 Loops:62 Thr:1 Vec:8
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 10000000/10000000 (100.00%)
Rejected.........: 0/10000000 (0.00%)
Restore.Point....: 10000/10000 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:992-1000 Iteration:0-62
Candidate.Engine.: Device Generator
Candidates.#1....: 2933896 -> 6887494

Started: Thu May  9 17:51:17 2024
Stopped: Thu May  9 17:51:22 2024


hashcat -a 3 -m 1000 hashes.hash ?d?d?d?d?d?d?d

Im running this to crack a windows NTLM on wsl with cali. Help?

Does anybody cracked Apple Secure Notes hash successfully!

$
0
0
Please report or dm
Does anybody cracked Apple Secure Notes hash successfully! With an unknown password and a known hint!

Brute force with hashcat

$
0
0
Starting to learn hashcat and I wanted to brute force a hashed MD5 password.

I used the command

hashcat -m 0 hash -a 3 ?a?a?a?a?a?a?a ‐‐increment

Which should start at 7 characters and increment. I ran this on a cloud GPU system with four Nvidia 4090’s and it said it would take less than 5 minutes to crack. However it finished with “exhausted” and wasn’t able to crack them. I tried generating other simple password hashes to test but still no luck.

Why wasn’t brute force able to crack them despite it finishing? Shouldn’t it have gone through every possible combination if it had finished?

Need some help with this. [Exceeds my noob knowledge]

$
0
0
Hey guys, I made an Electrum wallet, some 5 years ago and sent some funds into it, I hadn't saved the password in my password manager program when my PC had a BSOD, luckily I could restore my PC and my wallet was intact, however I since been unable to access said wallet. I still remember parts of the password, but can't remember the other half. So I have 3 questions

1,How do you guys suggest I proceed with haschcat? Should I use Dictionary attack, Combinator attack or Brute-force attack?

2,  I am planning on running this on a regular VPS with 12 core  and 12gb ram without a GPU will this work?

3, Does anyone know how to check the wallet balance using addresses from the wallet I sent from. I lost the destination wallet address , so i want to check through all my transfers

Automatic /r stripping by hashcat?

$
0
0
Hello,
I have not found it documented that hashcat automatically strips /r (CR) characters but it seems to be doing so.  I have been going under my apparently old understanding that, when present, /r needed to be removed manually (dos2unix, or similar).

The steps I used to test this are:
1. I created two wordlists, nixlist and winlist with the same words.  On each line in winlist I manually added carriage returns (/r) using CTRL-V CTRL-M in vim (I didn't have a Windows computer handy to make the file).
2. I confirmed the wordlist file structure using hexdump.
3. I manually hashed nixlist and winlist with openssl to confirm the /r was causing hashes to be different.
4. I then created a hashlist by hashing nixlist and saved it to a file named hashlist
5. Next I ran hashcat on hashlist using winlist as the wordlist.  Before doing so I made sure hashcat.potfile was empty and I also manually set the poftile to local.potfile
 
I was surprised to see that the winlist wordlist successfully recovered passwords in the nixlist-based hashlist.  This suggests that hashcat is stripping /r.
Can someone confirm this or specify my error?  If it is documented somewhere, can you point me to that link?


Command output:
Quote:cat winlist
hello
goodbye
lucky
snake
Quote:hexdump -c winlist
0000000  h  e  l  l  o  \r  \n  g  o  o  d  b  y  e  \r  \n
0000010  l  u  c  k  y  \r  \n  s  n  a  k  e  \r  \n  \n
000001f
Quote:for word in $(cat winlist); do echo -n "$word" | openssl sha1; done | awk '{print $2}'
e5ad4d3134d03e6bfc4de4f046c7c5d0b52962a5
ad928c1e055bbb0858c452b0d43b3740e53adc31
913e3490a7bf1ad10957f3073c8ea7e02f85bda0
9316338a5ff32b8172cb80d6b92dd6e8708ce46e
Quote:cat nixlist
hello
goodbye
lucky
snake
Quote:hexdump -c nixlist
0000000  h  e  l  l  o  \n  g  o  o  d  b  y  e  \n  l  u
0000010  c  k  y  \n  s  n  a  k  e  \n
000001a
Quote:for word in $(cat nixlist); do echo -n "$word" | openssl sha1; done | awk '{print $2}'
aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
3c8ec4874488f6090a157b014ce3397ca8e06d4f
1ce1416347075b6070a35ce5e9d26b61d91ea6c3
148627088915c721ccebb4c611b859031037e6ad
Quote:hashcat -m 100 -a 0 --potfile-path=local.potfile hashlist winlist
hashcat (v6.2.6) starting
<--truncated-->
Approaching final keyspace - workload adjusted.         
aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d:hello           
3c8ec4874488f6090a157b014ce3397ca8e06d4f:goodbye         
1ce1416347075b6070a35ce5e9d26b61d91ea6c3:lucky           
148627088915c721ccebb4c611b859031037e6adConfusednake           
                                                         
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 100 (SHA1)
Hash.Target......: hashlist
Time.Started.....: Fri May 10 08:57:18 2024 (0 secs)
Time.Estimated...: Fri May 10 08:57:18 2024 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (winlist)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:    4682 H/s (0.03ms) @ Accel:1024 Loops:1 Thr:64 Vec:1
Recovered........: 4/4 (100.00%) Digests (total), 4/4 (100.00%) Digests (new)
Progress.........: 5/5 (100.00%)
Rejected.........: 0/5 (0.00%)
Restore.Point....: 0/5 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: hello ->
Hardware.Mon.#1..: Util: 89%
Started: Fri May 10 08:57:18 2024
Stopped: Fri May 10 08:57:19 2024
Quote:cat local.potfile
aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d:hello
3c8ec4874488f6090a157b014ce3397ca8e06d4f:goodbye
1ce1416347075b6070a35ce5e9d26b61d91ea6c3:lucky
148627088915c721ccebb4c611b859031037e6adConfusednake

Thank you for any help you can offer.

Night dating, no obligations, one night only

$
0
0
Casual dating at its finest – join the leading platform for relaxed and fun encounters!
Harmony of intimacy, uninhibitedness with mutual consent
Genuine Females
Top-notch casual Dating

Help with hash identifier

$
0
0
Hello,,,

I have a hash and don't know what type it is. I will provide you with the correct hash and password. Can you help identify the type? and how to break it using hashcat..

Hash: AMGIGo2MPhGsHTYcibuLGX9g1PRKMIdVMjggf7Hbyu8HsVAP9eP49MLEUYrikVvwJw==
Password: alnukhba2021

Thanks

How can i find the number of rounds in sha512(-m 1700).

$
0
0
The default number of rounds is 80, but I can't find that in the code. And is the hash value below the hash value of “hashcat”? I would appreciate it if you could let me know.

static const char *ST_PASS        = "hashcat";
static const char *ST_HASH        = "82a9dda829eb7f8ffe9fbe49e45d47d2dad9664fbb7adf72492e3c81ebd3e29134d9bc12212bf83c6840f10e8246b9db54a4859b7ccd0123d86e5872c1e5082f";
Viewing all 8244 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>