Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7672 articles
Browse latest View live

Changing fan speed of ATI under linux

$
0
0
Hi I'm runnning debian wheezy with amd catalyst 14.9 and 3 r9 290x and I followed the following guide http://hashcat.net/wiki/doku.php?id=chan...nder_linux and when typing the following command DISPLAY=0.1 aticonfig --pplib-cmd 'set fanspeed 0 60' I get the error ati_pplib_cmd: Unable to open display `0.1'.
aticonfig: parsing the command-line failed. This problem only happens on the 2nd or 3rd card not the 1st one. Thank you for your time.

Sha256 salted with password

upgrade to 1.32 failed clGetDeviceIDs( ) -1

$
0
0
Hi,

I have been using oclHashcat for quite some time, and have upgraded my machine's hashcat and catalyst version several times in the past few years. However this latest upgrade has eluded me.

Details:
- Ubuntu 12.04
- 2x AMD Radeon 6790
- Catalyst 14.9
- oclHashcat 1.32

I upgraded my machines to forceware 14.9 and oclHashcat 1.32 per instructions. Running clinfo detects both GPUs just fine. However no matter what I do hashcat reports the error "clGetDeviceIDs( ) -1".

What I have tried so far:
- Setting DISPLAY variables correctly
- Using xhost to turn off acls
- running oclHashcat as normal user and root
- reinstalling catalyst several times

The same thing is happening on three identical servers. Was support dropped for the 67xx cards?

Any help would be greatly appreciated.

Sha256 all rejects passwords

$
0
0
When using long passwords, which is a must as my password list must contain a predefined long text after each password, it rejects all of them, yet if I use combination attack with the predefined text on the right with the normal list on the left it cracks fine, so basically why is sha256 rejecting passwords of long length, like 25chars or so.


If I use the passwords that cracked from the combination just as a normal straight attack, it just rejects every single one and none cracks.

Mask help

$
0
0
I have a password hash I'm trying to crack. There is a pattern with previous found passwords in the group in that they all repeat 1 character once, and they're all the same length. How can I create a mask to brute force all passwords of the set length while making sure each generated guess repeats only 1 of the characters once? For example, I'd like it to guess:
abcd12345a
abcd12345b
...
abcd123455

but NOT guess:
abcd123456 (all characters unique)
abcd1234aa (1 character repeated more than twice)
abcd1234ab (2 characters repeated twice)

oclHashcat not displaying HWMon Info

$
0
0
I've been running cudaHashcat 1.32 with two old nVidia cards for a couple weeks and decided to get two R9 290X cards to speed things up.

I powered down, removed the nVidia cards, installed the 290X's booted up, installed Catalyst 14.9, rebooted again and downloaded and fired up oclHashcat64.exe v1.32.

oclHashcat finds both cards and works just fine, but it's not displaying any of the HWMon info (Util, Temp, Fan).

I'm on Win 8.1 x64 btw.

Another quick question: Is it possible to use both AMD and nVidia cards at the same time?


Code:
Session.Name...: oclHashcat
Status.........: Running
Input.Mode.....: Mask (?1?1?1?1?1?1) [6]
Hash.Target....: File (v:\xls.txt)
Hash.Type......: MS Office <= 2003 SHA1 + RC4, oldoffice$3, oldoffice$4
Time.Started...: Thu Feb 05 08:28:43 2015 (49 mins, 12 secs)
Time.Estimated.: Thu Feb 05 14:42:58 2015 (5 hours, 21 mins)
Speed.GPU.#1...: 18197.6 kH/s
Speed.GPU.#2...: 15398.4 kH/s
Speed.GPU.#*...: 33596.1 kH/s
Recovered......: 0/3 (0.00%) Digests, 0/3 (0.00%) Salts
Progress.......: 256935219200/2205275671875 (11.65%)
Skipped........: 0/256935219200 (0.00%)
Rejected.......: 0/256935219200 (0.00%)

[s]tatus [p]ause [r]esume [b]ypass [q]uit =>

A Rule For not more then 2 consecutive number or letter

$
0
0
Is there a rule that i can make the will not repeat not more then 2 consecutive numbers in bruteforce attack using oclhascat64.exe?

Like in crunch the -d switch in the example below(no more then 2 consecutive number)

crunch 10 10 1234567890 -d 2@ -o Numberlist_d_swich.txt

I looked in to maskprocessor rule, but i didn't find any.

TIA

hashstack reviews

$
0
0
I have read Hashstack being mentioned on a lot of threads here as an option for distributed cracking. The product seems very well put together. I was wondering if anyone has used is and has any experience with it. Also, if anyone has a link to a review, that would be helpful. epixoip, I know this is your tool and would like to hear from others about it. I have also reviewed hashtopus. Not saying it is any less or more than hashstack, just interested in user reviews of this particular tool. I read the rules for the forum and didn't seem like this was a forbidden topic. If it is, I understand. Thanks.

only cracking the first part ?

$
0
0
Hi I really like active communities and I was told this is one of the most active hash cracking communities. So here is my question
Is it possible to crack only the first few characters of a hash ?
I mean that I have a hash which in plain text makes 35 FUCKING CHARACTERS with special chars lower case numbers AND upper case dude how mangy decades do I need to crack that ??
That's 62^35 my calculator can't even that that number in ...
So here's the deal I ONLY want the first 6 chars of the password how do I do it ?

[help] Unknown option --output-file= "error"

"Support for CUDA was dropped by NVIDIA"

$
0
0
Hey all. Brand new to hashcat. I just downloaded the latest version of cudaHashCat and tried running the example but am getting a strange error. I know CUDA is working just fine as all the samples provided by NVIDIA work flawlessly. Anyone have any suggestions?

Quote:cudaHashcat v1.32 starting...

Device #1: GeForce GT 240, 1023MB, 1340Mhz, 12MCU
Device #1: WARNING! Kernel exec timeout is not disabled, it might cause you errors of code 702

Hashes: 6494 hashes; 6494 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes
Applicable Optimizers:
* Zero-Byte
* Precompute-Init
* Precompute-Merkle-Demgard
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Scalar-Mode
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c


ERROR: Shader Model 1.0 - 1.3 based GPU detected. Support for CUDA was dropped by NVidia.



Remove it from your system or use -d and select only supported cards.

(New User) Error: Wordlists/:

$
0
0
Hey everyone, new user here, so sorry if this is something simple(I hope it is). I was following this YT tut

to get the hashcat working. The error message I'm getting is "Error: wordlists/: No such file or directory" I do have a wordlist file. what I'm typing into CMD is: "cudaHashcat64.exe -m 0 --outfile=cracked.txt --remove hash.txt wordlists/"
I've looked on the forums and the user guides, but I have had no luck finding a fix for it. If there is any extra information you guys need, just let me know! Thank-you

[Image: dAVnvIY.png]

ERROR: cuModuleLoad() 209

$
0
0
Hi,

Just trying to test cudaHashcat64 on a ubuntu-desktop linux 14.04.1.
In fact i try first with Windows 7 x64 and it's working fine, now trying to run it on linux just to compare.

First ill try to install it on ubuntu-server edition and i got the same error. Ill try to install it on a ubuntu-desktop ... again the cuModuleLoad() 209 error.

Here my steps, im close of a tutorial ... :
-Installating Ubuntu-Desktop 14.04.1 on a i7 with a 570GTX
-Installing ssh : sudo apt-get install ssh
-Downloading lastest cuda driver : wget http://developer.download.nvidia.com/com...nux_64.run
-Convert to executable : sudo chmod +x cuda_6.5.14_linux_64.run
-Stopping X : sudo service lightdm stop
-Connecting with the ssh because i got a black screen on the local pc
-Installing the cuda driver : sudo ./cuda_6.5.14_linux_64.run
(Accepting the EULA - Installing everything as default)
-Rebooting the pc : sudo reboot now
-Downloading cudaHashcat : wget http://hashcat.net/files/cudaHashcat-1.32.7z
-Installing P7Zip : sudo apt-get install p7zip-full
-Unziping the archive : 7za x cudaHashcat-1.32.7z
-Goiing to folder : cd cudaHashcat-1.32.7z
-Trying to benchmark (easiest command ill try 4-5 other's) : sudo ./cudaHashcat64.bin -b

And here i got the error :
Quote:cudaHashcat v1.32 starting in benchmark-mode...

Device #1: GeForce GTX 570, 1279MB, 1540Mhz, 15MCU

ERROR: cuModuleLoad() 209

Is it even possible?

$
0
0
Is it possible to crack a 10 characters password given that it will only be made out of lower and uppercase english letters?

Decrypt office with RC4 KEY

$
0
0
Hi all, I would like to know if someone created a script, program, etc for decrypt the Office using only the RC4 key.
With the option -m 9710 I can found the key, but, to open the file I still need the -m 9720 to found a valid "password".
The main question is: someone here can create a script to decrypt the file using only the RC4 key?!
Thank you very much for your help.

No Output of Cracked Hashes

$
0
0
Alright, hopefully this'll be my last question(I feel bad for being so uneducated on this and am doing my best to learn Tongue ). I've almost gotten it to run properly, I'm just not getting any cracked hashes to my outfile. I'm still a noob with this, so this may be irrelevant, but it seems like it's going through the process way too quickly. I was attempting around 5k MD5 hashes with about 15gigs in worldfiles and it was taking 3~ minutes. My uneducated thought is that I may have something setup wrong, therefore no hashes were being crack, thus not giving me anything in my outfile. I'm going to link a picture below of my end result. my CMD line is "cudaHashcat64.exe -m 0 --outfile=cracked.txt -remove hash.txt wordlists"

TL;DR No cracked hashes in my outfile.

Help about office documents

$
0
0
Hello everyone i need your help
I want to attack a office 2007 document with oclhashcat
But i don't know how can i do
Is there anyone help about that ?
Best Regards

maskprocessor and statsprocess are now open source

Email Wordlist

Cant find SAM for Windows 2008 R2

$
0
0
I have physical access to a Windows 2008 R2 that the client has lost his password for, and I am trying to recover the password.

I am following this guide:

I boot the PC using Kali Live CD
I mount the hard drive
cd /mnt/
ls

I can see the "Users" folder, but no "Windows" folder, and so I am not able to find the SAM files so I can hashcat the passwords

http://www.computersecuritystudent.com/S...G/lesson2/

I am stuck, with nothing to bruteforce

Anyone know what to do for Windows 2008 R2 password recovery? Thanks
Viewing all 7672 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>