Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7672 articles
Browse latest View live

Mask >10 years for 11 char lowercase, decimal WPA2 hash

$
0
0
I'm trying to crack my own WPA2 password with a mask attack, its a lowercase decimal password exactly 11 characters long, I've set my charset to only use lowercase and decimal, I've then set the password length to only try 11 character passwords yet the output shows a 10+ year estimate

Code:
oclHashcat64.exe -a 3 -m 2500 --session=all -o "C:\Users\me\Downloads\hashcat-0.49\hashcatgui\capture_found.txt" --outfile-format=3 --potfile-disable -w 2 --gpu-temp-abort=90 -i --increment-min=11 --increment-max=11 -1 ?l?d "C:\Users\me\Downloads\capture.cap" ?1?1?1?1?1?1?1?1?1?1?1

http://i.imgur.com/nULq4aX.png

Problems downloading oclHashcat

$
0
0
I don't know if this is the correct section, but I didn't find any better one.

I have some problems while downloading oclHashcat from CLI using a very fast connection (more than 3Mb/s).
If I simply try to fetch the archive, I can only download about 15Mb of it, then the connection is dropped.
I have to manually set a download limit (for example 800Kb/s) and everything goes smooth.
Is there any bot protection or something like that?

Sorry for the stupid question Smile

Whirlpool + salt?

$
0
0
Is it possible to crack a whirlpool hash if it has been salted? I have a list of hashes, each with a 5 digit number as a salt. How would I go about cracking this? Is it possible with hashcat?

IPMI2 RAKP HMAC-SHA1, salt-length exception

$
0
0
Hello,

I'm new to hashcat/oclhashcat, but have been muddling along OK for a bit. I have some hashes I'm trying to process, dumped using Metasploit's auxiliary/scanner/ipmi/ipmi_dumphashes in both hashcat and JtR formats. The latter is grinding along on one system, but I thought I'd try them here also.

Using the -m 7300 flag to select the correct type, I get the following:

WARNING: Hashfile 'ipmi_hashcat' in line 1 (10.x.x.x Username:fc3d7a1c609f06008ac49f345fe3f871d84eeb03161fbe9aab220000ee7c00007c39000​07c3400003630333235394d585131303230314e56140d41646d696e6973747261746f72:5b283dbf​8174178775b64115519701a7afd73417): Salt-length exception

Any suggestions?

Computer Keeps Freezing...

$
0
0
Hi,

I am trying to run oclHashcat on my computer with 2 GTX 660s. These gpus are not overclocked at all.

When I leave hashcat on for a while, I will eventually come back to a frozen computer. I cannot move the mouse, and the keyboard does not function. I thought that the gpus might be overheating, so I set the fan speed pretty high. The temps were 61 and 72, but the computer still froze at some point.

Two Questions:

1) Can I recover the progress I have made on a hash if the computer freezes?

2) Why is this happening? Can I run some diagnostic to see why?

Mask letters and numbers

$
0
0
Hello.

The password is 12 digits. It consists of A-Z 0-9
I know the last 6 characters password.
How to use a mask in order to discover the first 6 characters?
Help me to top up the mask.

oclHashcat64.bin stopped after update with r9 290x.

$
0
0
Hi guys,

I have a r9 290x card and I used it several times with success with oclHashcat 1.21, today I tried to use it again and it told that it's outdated. I downloaded the latest version oclHashcat-1.33 and it complained about my amd driver, so I installed the AMD Catalyst™ Proprietary Driver-14.301.1001

All worked, the only issues when calling amdconfig --adapter=all --odgt.

I noticed that when calling clinfo it says:

clinfo: /usr/lib/x86_64-linux-gnu/libOpenCL.so.1: no version information available (required by clinfo)
clinfo: /usr/lib/x86_64-linux-gnu/libOpenCL.so.1: no version information available (required by clinfo)

clinfo: relocation error: clinfo: symbol clRetainDevice, version OPENCL_1.2 not defined in file libOpenCL.so.1 with link time reference

But it display all information as expected.

However, when I run oclHashcat it never try crack anything. See below:

lda@Ubuntu:~/oclHashcat-1.33$ ./oclHashcat64.bin -m 5500 /tmp/hash.txt /tmp/words.txt -r rules/best64.rule -o Results.txt --session=test
./oclHashcat64.bin: /usr/lib/x86_64-linux-gnu/libOpenCL.so.1: no version information available (required by ./oclHashcat64.bin)
./oclHashcat64.bin: /usr/lib/x86_64-linux-gnu/libOpenCL.so.1: no version information available (required by ./oclHashcat64.bin)
oclHashcat v1.33 starting...

Device #1: Hawaii, 3072MB, 1000Mhz, 44MCU

Hashes: 11 hashes; 11 unique digests, 11 unique salts
Bitmaps: 9 bits, 512 entries, 0x000001ff mask, 2048 bytes
Rules: 26922
Applicable Optimizers:
* Zero-Byte
* Precompute-Final-Permutation
* Not-Iterated
* Scalar-Mode
Watchdog: Temperature abort trigger set to 95c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4098/m05500_a0.Hawaii_1573.4_1573.4 (VM).kernel (628500 bytes)
./oclHashcat64.bin: relocation error: ./oclHashcat64.bin: symbol clEnqueueFillBuffer, version OPENCL_1.2 not defined in file libOpenCL.so.1 with link time reference
lda@Ubuntu:~/oclHashcat-1.33$

Advises?

Thanks.

Question about rules.

$
0
0
Hi guys,

I know that I could execute oclHashcat multiple times with different rules, however, suppose that I want to put together a single rule file with multiple rules, what is the proper way to do it?

I'm curious if rules are created per line or not. I was thinking that the proper way should be cat rule1 rule2 rule 3 |sort|uniq > final-rule.txt

This would avoid duplicated rules, however I'm concerned if it will break the logic of the rules since I don't know if they have multiple lines.

Is there a proper way to do it? Or there is no easy solution?

Thanks.

GTX Titan X

$
0
0
Howdy.

So, Videocards confirms that GTX Titan X will have 3072 shaders at 1.076 GHz.
A rough estimation of speed (margin of error should be ~5%) can be made between gtx titan x and gtx 980: (3072 * 1.076) / (2048 * 1.190) = 1.3563 .
This means that a GTX Titan X should be around 35% faster than a GTX 980.
However, if the rumored price of $1000 proves to be true, GTX Titan X will not beat GTX 980 in terms of performance/$ .
Still, fastest single-gpu graphics card Nvidia has to offer.

Rolf out.

Social Distributed Hashcat

$
0
0
Hi,
I came here when I was doing research on WPA password recovery for my network. As probably everyone knows it's taking a lot of time to crack stuff using brute force. That's why I came up with idea to distribute mask chunks on multiple computers. I know there is hashtopus but I need something what is working with hashcat. Than I realise that I still don't have enough computers to speed up this process.

So the idea:
- create portal where you can upload your file ( specify hashcat/hashtopus parameters like type etc )
- people download client, which is downloading file and chunks to check

Additional:
- for every chunk / password checked you receive points, this points are used for cracking
- selling your computer calculation power

I'm not really into cracking, do you think this make sense ? Is there is already something like this ?

(excuse me if the idea is not clear enough - it's Friday)

Hashcat only using one gpu

$
0
0
Alright so having a problem with hashcat only utilizing one graphics card sometimes it uses gpu0 sometimes gpu1 seems to pick one at random each time hashcat is loaded.

I have tried re-installing nvidia drivers (347.52) with perform clean install checked also tried hashcat versions 1.33, 1.32, 1.31 with same results so clearly its a problem on my end any suggestions?

http://i.imgur.com/rjgcvsR.png

Thanks

decrypt hash

$
0
0
Can someone please decrypt this for me or tell me how to do it? I am at a loss. Ty so very much.

Melissa

1C84C4BF510133FF64233469706C80FC

Pipe is slow

$
0
0
Dear atom, in https://hashcat.net/trac/ticket/604#comment:2 you recomend use pipe, but this mode is slow.

Example:

..\hashcat-0.49\hashcat-cliAVX2.exe -r bf.rule "D:\AIR\wordlist\concentrate" --stdout | cudaHashcat64.exe -a 0 -m 2500 --session=s6 -w 2 --gpu-temp-abort=90 --gpu-temp-retain=90 -o "D:\keys\hash_found.txt" --outfile-format=3 D:\in.hccap

Quote:cudaHashcat v1.33 starting...

Device #1: GeForce GTX 980, 4096MB, 1278Mhz, 16MCU
Device #2: GeForce GTX 970, 4096MB, 1253Mhz, 13MCU
Device #3: GeForce GTX 970, 4096MB, 1304Mhz, 13MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 90c
Device #1: Kernel ./kernels/4318/m02500.sm_52.64.ptx
Device #1: Kernel ./kernels/4318/amp_a0_v1.64.ptx
Device #2: Kernel ./kernels/4318/m02500.sm_52.64.ptx
Device #2: Kernel ./kernels/4318/amp_a0_v1.64.ptx
Device #3: Kernel ./kernels/4318/m02500.sm_52.64.ptx
Device #3: Kernel ./kernels/4318/amp_a0_v1.64.ptx

Starting attack in stdin mode...

Session.Name...: s6
Status.........: Running
Input.Mode.....: Pipe
Hash.Target....: ********* (********* <-> *********)
Hash.Type......: WPA/WPA2
Time.Started...: Sat Mar 14 18:28:04 2015 (5 mins, 22 secs)
Speed.GPU.#1...: 110.6 kH/s
Speed.GPU.#2...: 89863 H/s
Speed.GPU.#3...: 89887 H/s
Speed.GPU.#*...: 290.4 kH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 92037170
Skipped........: 0
Rejected.......: 2221200
HWMon.GPU.#1...: 99% Util, 76c Temp, N/A Fan
HWMon.GPU.#2...: 86% Util, 65c Temp, N/A Fan
HWMon.GPU.#3...: 51% Util, 76c Temp, N/A Fan

.png  1.png (Size: 72.29 KB / Downloads: 4)

Classic wordlist example:

cudaHashcat64.exe -a 0 -m 2500 --session=s4 -w 2 --gpu-temp-abort=90 --gpu-temp-retain=90 -o "D:\keys\hash_found.txt" --outfile-format=3 D:\in.hccap "D:\AIR\wordlist\BIG"

Quote:cudaHashcat v1.33 starting...

Device #1: GeForce GTX 980, 4096MB, 1278Mhz, 16MCU
Device #2: GeForce GTX 970, 4096MB, 1253Mhz, 13MCU
Device #3: GeForce GTX 970, 4096MB, 1304Mhz, 13MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 90c
Device #1: Kernel ./kernels/4318/m02500.sm_52.64.ptx
Device #1: Kernel ./kernels/4318/amp_a0_v1.64.ptx
Device #2: Kernel ./kernels/4318/m02500.sm_52.64.ptx
Device #2: Kernel ./kernels/4318/amp_a0_v1.64.ptx
Device #3: Kernel ./kernels/4318/m02500.sm_52.64.ptx
Device #3: Kernel ./kernels/4318/amp_a0_v1.64.ptx

Cache-hit dictionary stats D:\wordlist\BIG/08: 4497719949 bytes, 499746661 w
ords, 499746661 keyspace

Session.Name...: s4
Status.........: Running
Input.Mode.....: File (D:\wordlist\BIG/08)
Hash.Target....: ********* (********* <-> *********)
Hash.Type......: WPA/WPA2
Time.Started...: Sat Mar 14 16:51:12 2015 (23 secs)
Time.Estimated.: Sat Mar 14 17:32:52 2015 (41 mins, 15 secs)
Speed.GPU.#1...: 156.6 kH/s
Speed.GPU.#2...: 131.5 kH/s
Speed.GPU.#3...: 137.1 kH/s
Speed.GPU.#*...: 425.2 kH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 4665344/499746661 (0.93%)
Skipped........: 0/4665344 (0.00%)
Rejected.......: 0/4665344 (0.00%)
Restore.Point..: 4605952/499746661 (0.92%)
HWMon.GPU.#1...: 96% Util, 70c Temp, N/A Fan
HWMon.GPU.#2...: 93% Util, 73c Temp, N/A Fan
HWMon.GPU.#3...: 95% Util, 72c Temp, N/A Fan

I use CPU: Core i7-4820k, 32GB quad channel DDR3.
All videocard install in PCI-E x16 Gen3
It not to be slow.

How i can get full speed with pipe?

Output

$
0
0
I have combos that are hashed email:hash I want to run them through oclhashcat and want the output to be email:decrypted hash how could I do this what command would I need so it's email:pass

the correct syntax to pipe maskprocessor | cudahashcat in linux?

$
0
0
tried almost everything.

cd /usr/share/maskprocessor && ./mp.bin -q 3 -r 4 ?d?d?d?d?d?d?d?d?d?d | cd /usr/share/cudahashcat/ && ./cudaHashcat64.bin -w 3 -t 10 -m 2500 /root/capture.hccap -a 3

while this is the correct path for both maskprocessor and cudahashcat, the whole syntax doesn't work. Any ideas what I'm doing wrong here? Really an example would have been really helpful.

hashcat & truecrypt

$
0
0
Good evening folks!

I searched on the Internet for a tool that will allow me to use a dictionary to find my password for my TrueCrypt file and I found this website!

Unfortunately, I am not sure what I'm doing wrong to get it running.... Here's the command that I'm using:


Quote:C:\Users\Orion\Desktop\oclHashcat-1.33>oclHashcat64.exe -m 6211 TrueEncrypted.tc -a 6 dictionary.txt -n 5
12 hash
oclHashcat v1.33 starting...

Usage: oclHashcat64.exe [options]... hash|hashfile|hccapfile [dictionary|mask|di
rectory]...

Try --help for more help.

I am using a GTX 960 (if that helps)

Let me know if you need more details! Cheers!

STOP! The installed GPU driver in your system is known to be broken!

$
0
0
I keep getting this message when attempting to run oclhashcat -

"STOP! The installed GPU driver in your system is known to be broken!"

I have two cards installed....Sapphire 7770 in the main agp slot (used for the Monitor) and Sapphire 6870 in the second agp slot.

I have ran the timeout fix from https://hashcat.net/wiki/doku.php?id=timeout_patch but this does not fix the error.

Any ideas/help?

Rab.

Only 3 of 4 X290 detected

$
0
0
Hi guys,

we just recently built a system and have issues with the 4th card.

Hardware:
Motherboard: MSI Big Bang-XPower II (MS-7737)
CPU: Intel Core i7 @ 3.70GHz Ivy Bridge-E 22nm Technology
GPU: 4x 4096MB ATI AMD Radeon R9 200 Series (Sapphire/PCPartner)

According to our main board we have 40 data lanes for the GPUs,
There are 7 PCI express sockets:
4 times 16x, 3 times 8x

Also according to the mother board specification we can have 4 GPUs installed in the configuration:
1, 3, 5, 7
which would lead to:
16x, 8x, 8x, 8x

Unfortunately, there are only 3 GPUs shown in our Hardware monitor, GPU-Z, Speccy, Catalyst.
oclHashcat only shows 3 GPUs, but works fine with those 3.

I have enabled all 4 PCIe on the motherboard.

The bios does not allow me to configure any more options for the PCIe, in fact, they are not even shown.

All drivers for the motherboard, chipset are installed.

Could anyone think of a solution? Any help is kindly appreciated!


Some Pics:
http://i.imgur.com/Shzjz30.jpg ( GPU-Z, hardware monitor )
http://i.imgur.com/UR7VmD9.png ( Catalyst )
http://imgur.com/5Za2F0e ( Speccy )

Wordlist approach?

$
0
0
Hey I have to say what great software! I have seen it in the past but never had a chance to try it out. Hats off to the devs and to the support staff on the forums most my questions were clearly addressed prior to me even asking them from the forums.

I do have a question on opinion and Im sure the response will be "It depends" based off the target passwords I need to get.

But what is the best method of approaching breaking passwords. Example:

Right now here is how I am cracking passwords:

List of human-passwords no rules.
List of human-passwords with \d\d at the end.
List of words no rules.
Lust of words with \d\d at the end.

Is there a better generalized method for getting more passwords on a first few passes? Should I mix up my order? (25 mins on my rig)

Currently my human-password list is 946MB in size and is made of Gmail 5 million leak, and 10 Million example passwords publication. I have stripped out usernames and emails so its purely the passwords. (4 hours on my rig)

My word list is a collection of people places and things (movies books etc). Its about 5GB and contains only lower case words.

Currently I am doing research into distributing the cracking across a number of workstations \ into my ESX cluster but I hear GPU is the way to go.

Hashcat Rules

$
0
0
Hi Guys,

I would like to apply some rules for a brute forcing attack:

min 8 char
max 16 char
max 6 number
max 4 special
max 4 upper

Is this possible?

Thanks
Viewing all 7672 articles
Browse latest View live