Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8118 articles
Browse latest View live

Hashcat.net on distributed.net

$
0
0
I would like to inform you that hashcat.net now has a team with distributed.net .
Distributed.net is mostly about cracking RSA's RC5-72 challenge, among other things.
There's a small individual $1k reward for this.
The idea is to promote hashcat.net by immortalizing it in the top100 overall stats (there's never enough fame, right?).
Feel free to join if you'd like to support hc.net by donating your idle GPU cycles to this cause.

Even though the binaries are years old, they still work: win+cuda, win+opencl, x64stream+linux or x86stream+linux.
Other binaries for other OSes and platforms can be found using the links below.
If your AV complains, read a note about it below.

To "register", you have to use a real email in your ini file first (a sample ini file attached, which should be renamed from dnetc.txt to dnetc.ini, and put in the same folder as dnetc.exe).
At 00:00 UTC, the stats get updated, and your progress is actually displayed.
Once that happens, you have to go to the stats page, search for yourself by email, click the "email me my password" below and then, once you get your password, you can change your info.
Now, once the info is changed, you can join our team by just clicking "I want to join this team" below.
Your affiliation with the team will be updated at 00:00 UTC, but don't worry, all the work you've ever done will go to the team's stats.

Some word about the binary zips.
A lot of AV complained about some virus in the binaries.
Virustotal says the pesky dnetc.com file is the cause, which is obsolete for us.
Just run the .exe file and delete the .com file.

Some links:
http://www.distributed.net/Docs
http://www.distributed.net/Howto

http://www.distributed.net/Download_prerelease
http://www.distributed.net/Download_clients

.txt  dnetc.txt (Size: 118 bytes / Downloads: 3)

ati and nvidia working together

$
0
0
hello
I have two card one from ati (hd7750) and second nvidia (gtx560ti).
It is possible to comput with this two card one hash (working together) using only one startup file ?

Partial Solve?

$
0
0
I am a noob to hashcat, and modern crypto, and I was wondering if theres a way to solve an encrypted string for say, just the first few characters, even if the bulk of the string is unknown.

ie:
xxyyyyyyyyyyyyyyyyyyyzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

I know what y is, I dont know what z or x is,BUT I only need x.

ASIC support?

$
0
0
Does hashcat plan to support ASIC Chips like what avalon is cranking out for bitcoin mining?

Not built for this specifically, but it seems like the next logical step after gpu's, and since they are basically just chips custom built for nothing but running sha256 compares as fast as possible, It shouldn't be too tough to integrate. Hell, they are using alot of the same metrics we are already.

It would represent a dramatic increase in the potency of any decent mask supporting pw recovery tool.
(a 5 gigahash/second box is only about $250)

terrahash seems the most intresting prospect right now....
http://www.terrahash.com

Min/Max Password Length

$
0
0
I'm working on script to do my combination tests and I was looking to narrow down the size of the words going in.

My if statements for ocl/cudahashcat restrict that to 8-16 but I can't seem to find what the upper limit is for hashcat itself. The wiki shows a min but no max http://hashcat.net/wiki/doku.php?id=hashcat

The plan is to bruteforce 1-8 then use oclhashcat for 8-16 and then use hashcat for 17+.

Peace

cant convert CAP to HCCAP

$
0
0
Hello, i have a problem. Cant convert my .CAP file. File works fine in aircrack, but aircrack dont have GPU acceleration. When i trying to convert file online it says "no valid handshakes found".

Looking to build/buy hashcat computer

$
0
0
Hey Guys, I have a budget of around 1K dollars for a PC desktop. Does anyone out there know of a packaged computer, or build list that is the best bang for your bucks in terms of max GPU speeds for cracking.

Thanks!

best way to handle spaces output/hashcat.pot

$
0
0
Somewhere along the line I messed up one of my dictionary files and when I ran a combination attack this is what Im seeing.
Code:
Hash.Type......: MD5
Time.Started...: Sat Jul 27 15:44:46 2013 (14 secs)
Time.Estimated.: Sat Jul 27 16:31:54 2013 (46 mins, 42 secs)
Speed.GPU.#1...:  5186.5k/s
Recovered......: 0/5110730 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 17821696/3517701976 (0.51%)
Rejected.......: 0/17821696 (0.00%)
HWMon.GPU.#1...:  0% Util, 47c Temp, 36% Fan

2d7c2a019bf96cfb5b997d320c890cb9:Ô19932803
1bec4f44733055dbc1d16bf027c8829c:       joconnor
1a0cb164efc739f4d73f91e61d437afd:       conversi
0efa706498b3c1277ce915122d1f54cc:'cesarcmt
2c9d5893e79276c0dac6e1a9a2e9ad72:       bsreddys
2e879f041282c13c66cf800051eed434:       rmromero
2b25d346066c66e30f487f193b69d62f:       jbalmana
0aaf64290a3ecd065a25bbdfbf020c54:       deniser6
1ec44a925faec80c88fe04cab3012e43:       jestelka
0a9ba30d25907e899cff5644579d4b61:       roslinda
1dc4a73aee12bf42630edd3317462202:       mornstar
2bd231867ca6f9480b615772a796f872:       starcool
0c495a6c2d3de226f5980b9b701f9936:       leolivia
377e1773126661605fa128edda5d8037:ÿ28021982
In case anyone is wondering thats from the https://www.korelogic.com/InfoSecSouthwe...ashes.html zip file.

The question really becomes is there a way to not loose the spaces so you can feed the results back into hashcat?

Im on a linux box so I tend to use cat hashcat.pot | cut -c 34- >outputfile.words

Im pretty certain thats not the best approach since it kills both leading and trailing spaces.

Peace

cudaHashcat-plus32 ERROR: cuctxcreat () 2

$
0
0
plz help me

oclHashcat-plus-0.14>cudaHashcat-plus32.exe -m 2500 -a3 captre.hccap ?d?d?d?d?d?d?d?d
cudaHashcat-plus v0.14 by atom starting ...

hashes : 1 total , 1 unique salts , 1 nique digests
Bitmams : 8 bits , 256 entries , 0x000000ff mask , 1024 bytes
Workload: 16 loops, 8accel
Watchdog:Temperature abort trigger set to 90c
Watchdog:Temperature retain trigger set to 80c
device #1 :GeoForce GTS 250, 512Mb,1836Mhz,16MCU
ERROR: cuCtxCreate () 2

win 7 32 bit
Nvidia 320.49 driver

oclHashcat install problems

$
0
0
Hey guys, I have two 7970's I'm trying to get setup with ubuntu server 12.04 LTS. I followed the wiki, but had a few problems. I think the problems are related to x11 and drivers not being installed correctly.

The error I'm getting when I run oclHashcat is this which appears to be driver related?

error while loading shared libraries: libnvidia-ml.so.1: cannot open shared object file: No such file or directory

Here is the dump from the terminal from the fresh install of ubuntu server. If anyone can help me get this going I would appreciate it.

http://pastebin.com/iET4GCSr

The case for $HEX[]

$
0
0
Since I (re) started working on hashes, I've been trying to find better ways to represent my "found" hashes, so that they can be re-used. One of the first questions I posed was "how do you represent passwords with embedded CR/LF/NUL characters?" (or other control characters).

In hashcat, the only way that seems to be available is to use hex output; but this then means that you need to decide, in advance, which passwords might contain control characters, and output them to a separate filename. In certain cases (like a CR or LF at the beginning or end of a password), you can use hex-salt, and one of -m 10 or -m 20, but this is a real pain.

A few months ago, I became frustrated enough to write some software for this, and implement it myself. As a result, I invented a new way to represent passwords that contain control characters. For "regular" passwords, no change is made. "password" still looks like "password" in my dictionary files. But if the password contains a control character (other than space or tab, of course), I "switch modes", and output the hex equivalent, enclosed in $HEX[].

So, a password of "foobar1[CRLF]" becomes:

$HEX[666f6f626172310d0a]

This has the added benefit of being able to use _any_ character in a passwords. Most hash algorithms (SHA1/MD5, etc) work on the basis of bytes in any event, so creating an arbitrary-length string in a dictionary file, of any set of characters, becomes really easy.

But is it really needed?

In the isw 2012 challenge of 139,444,502 hashes, I was able to find 127,224,531 solutions. more than 260,000 required $HEX - for example:

$HEX[0000]
$HEX[696d0a]
$HEX[55470a]

and many more.

Adding rules to prepend/postpend CR/CRLF/NUL etc is an easy way to find these, but without a regularized output format, it's impossible to re-use the data - this is particularly the case with passwords containing one or more CR/LF characters.

But can't you just use --hex-output?

Again, yes, this is an option, but to effectively re-use the dictionaries, I would have to convert all of my existing dictionaries to hex-output format. This would double the size of the dictionaries, and increase the loading time.

But having to parse the $HEX[] format means that loading passwords would be slow!

That's not the case. Note: This is not a plug for my software; it's not available. I'm using this as an illustration only of time required to parse the input.

To check 258M passwords in 9 file against 2,894,100 MD5 hashes takes hashcat (without $HEX[] parsing)

real 1m46.145s

Using oclHashcat:

real 3m6.574s

Using mdxfind (my code, including the $HEX[] parsing).

real 1m8.213s


(so about 30% faster, doing the $HEX[] parsing. My system had a load of 30 while running this; it wasn't idle).


So $HEX isn't slowing anything down. It just is a better way to represent passwords that contain unprintable characters.

If you have a better idea, please let me know. I've been struggling for quite some time with this, and have yet heard no better plans.

Comments?

Breaking SHA1-HMAC

$
0
0
I am new to hashcat and trying to do a simple experiment.

I generated a hash using the following:

echo -n "abcd" | openssl dgst -sha1 -hmac 1234

It generated a hash:
8717c25d45b7c48e66d917255c6e5b9e15edc46c

I would like to use hashcat to break this. How will I do it?

I tried using the following and it gives me an error: line length exception

hashcat-cli64.bin -m150 -a3 hashfile outputfile

I have the above mentioned hash in the hashfile.

I also have a GPU but I am NOT running oclHashcat-plus.

I really appreciate any help.

Error after migration from Win7 x32

$
0
0
Cannot start cracking, receive this error:

[Image: ab83ff7d0861.png]

Win7 x64, Catalyst 13.1.

Thanks.

Noob question

$
0
0
I'm sure this is just some oversight on my part, but when I try to use hashcatplus to crack an -m 200 hash, nothing happens. I know it is an older MySQL hash. When I put -m 300 in just to make sure, it gives me an error about the length. Am I missing some basic?? Can hashcatplus not do these type of hashes?

Thank you.

What can Hashcat do? im a noob, please help me

$
0
0
Hi, I am very new here. lets get started.

What can i do with hashcat? i know, hashcat can recover passwords, but what kind of password? media social password or what?

if i can recover my lost social media password, how can i do it?

and how can i get a hash of a password?

oh btw, i have amd fx 4100 and HD 7770, will this specifications get the job done?

i know, this questions are quite stupid, but i need a clear information.

thanks for your help and i'll appreciate it.
sorry for my bad english skill.

hashcat combination attack odd even difference

$
0
0
Combination attack in hashcat-cli64.exe -a 1 v0.46 acts differently with an odd number of words vs. even?

Edited: It's more complicated than that.
I'm getting single words in the output, not combinations, sometimes just once, and others more than once.

Can the programmers check if the combination attack is working properly?

Understanding hybrid_attack

$
0
0
Hi All,
I've some troubles in understanding how the hybrid_attack works.

what I would like to achieve is to try the follow chars pattern prepended to each of the words from the dictionary

Code:
[a-z0-9]+(.|_)[a-z0-9]+DICT_WORD

I'd like to have the keyspace incremental so that it will start from 3 chars up to X chars:

Code:
a.aDICT_WORD
zzzzzzzz.zzzzzzzDICT_WORD

Any help is really appreciated

How to crack wpa2???

$
0
0
admin & all members
i am new for hashcat user i want to know how to crack
A to F + 0 to 9 ( 8 length password )
i don't want to be use word list. only brute force attack
how many hours want to the crack time???
how to crack give me the code (mask)

My GPU MSI HD 7970 lightning
My PC i7
Memery 16GB

OclHashcat plus has stopped working.

$
0
0
I Think this might be a known issue, but I'll report it just the same.

Everytime i try to run ocl hashcat plus to crack WPA hccap file windows comes up with an error "oclhashcatplus has stopped working".

Relevant details are as follows:

OS = Win7 X64
Using RDP.
Installed catalyst control centre 13.1 - ALL options ticked during install. (e.g. for transcoding install and hdmi sound install etc).

Command issued:

oclHashcat-plus64.exe -a 0 -m 2500 Handshakes\myhccap.hccap Dictionaries\mydictionary.dic --gpu-temp-disable


I *think* thats all you need to know... but do let me know if there are other questions about my setup you have.

I couldn;t find any log files or anything to post....

: rule - question on behavior and use

$
0
0
I was working through a bash script to do email rule generation here is a sample of what it spits out

Code:
$@$0$1$2$.$n$e$t$.$i$l
:$@$0$1$2$.$n$e$t$.$i$l
d$@$0$1$2$.$n$e$t$.$i$l
l$@$0$1$2$.$n$e$t$.$i$l
u$@$0$1$2$.$n$e$t$.$i$l
c$@$0$1$2$.$n$e$t$.$i$l
C$@$0$1$2$.$n$e$t$.$i$l
t$@$0$1$2$.$n$e$t$.$i$l

Are the first 2 lines of that equivalent? If so is there a reason to prefer one over the other?

In a rule its not a big deal but overall I have something like 700 plus domains which just adds up.

Peace
Viewing all 8118 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>