Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7673 articles
Browse latest View live
↧

-m 20 = -m 21 ??

$
0
0
osCommerce = md5($salt.$pass)?

Exemple hash:
20 md5($salt.$pass) f0fda58630310a6dd91a7d8f0a4ceda2:4225637426
21 osCommerce, xt:Commerce 374996a5e8a5e57fd97d893f7df79824:36
WTF??
↧

--remove ?

$
0
0
Ok, so normally I would input the hash type with -m 10 and then follow it with --remove to have it remove all found hashes in my txt file and leave what isnt. Then I would output the found hashes by cudahashcat64 -m 0 --username --show --outfile-format 2 new.txt -o found.txt

It use to output the selected file with no issues, now for some reason it outputs nothing, what am I doing wrong?
↧
↧

wpa &wpa2

$
0
0
Hi

i try to crack a wpa and wpa2 password from my AP
i use 6 titan z and i get slow speed like 10k/s and for ?d?d?d?d?d?d?d?d a get 10 year to final...

what can i do?
if i get many handcheck this is help me?

bob
↧

Recover from hash with SSHA and Salt

$
0
0
Hi all,

I don't know much about recovery and I need help but I assume this shouldn't be too complicated, or is it?

The hash starts with {ssha} followed by 54 characters and ending with ==
Hash method is SSHA.
I also have the password in HEX and the length is 40 characters and also the Salt in HEX and the length is 40 characters.

How can I recover the password?
↧

Problem trying the example .pccap file + my wifi

$
0
0
I am a beginner in oclHashcat. I found problems during cracking my wifi. In order to understand what's happening, I tried with the example .pccap file http://hashcat.net/misc/example_hashes/hashcat.hccap in http://hashcat.net/wiki/doku.php?id=example_hashes

The pw should be hashcat!, but the status of the cmd was EXHAUSTED even "hashcat!" was included in the password list.
[Image: attachment.php?aid=322]

The .bat
[Image: attachment.php?aid=320]
The pw list
[Image: attachment.php?aid=321]



=================================================

Similar problem occurred during the cracking of my wifi. The pw of it is 123456123. When I used aircrack-ng to crack the file in ".cap" with the same dictionary file, the key could be found successfully. After I converted the .cap file to .pccap through an online converter, and used the .pccap file in oclhashcat with the command
[Image: attachment.php?aid=323]
the result was EXHAUSTED too
[Image: attachment.php?aid=324]

How to fix it? Any help is appreciated !

.png  1.PNG (Size: 2.89 KB / Downloads: 57)

.png  2.PNG (Size: 13.47 KB / Downloads: 56)

.png  3.PNG (Size: 17.09 KB / Downloads: 65)

.png  5.PNG (Size: 2.25 KB / Downloads: 62)

.png  6.PNG (Size: 17.18 KB / Downloads: 56)
↧
↧

Crack *.pae file

$
0
0
Hey guys,
I'm new here and need some help with a *.pae- file.
I don't know how to get the hash of the password and which encryption it is. Does anyone know this format?

Please excuse my bad english, but i'm german.

I hope you can help a newbie Smile
↧

cpu limit?

$
0
0
Hey Guys,

last year a friend let me play around with this 40-core (80-core w/ hyperthread) server for a few weeks. At the time I thought it would be cool to get some benchmark figures on slow hash types but from what I remember hashcat was unable to utilize all cores. Is there an upper limit on CPUs with HC?

My friend has a new and bigger server coming in the next few days. He said I can use it for a bit while the server rack and such are being prepped

edit: was just told the new server has 60-cores (120-cores w/ hyperthreading)
↧

hashcat problem

$
0
0
hi
well i named my hash text file as hash2.txt and my output file as cracked.txt my wordlist file as wordlists
the hash file is in email:hash format but it just wouldn't work and i don't know why and here's the pic
[Image: 516476582.jpg]
↧

Huawei Router Decode ?

$
0
0
I have this router configuration don't know exactly if it is decode with DES or what ... I tried a python program to decode but no luck sorry if that is not the place to post .

Thanks Smile

.txt  downloadconfigfile.txt (Size: 20.13 KB / Downloads: 4)
↧
↧

Hashtopus problem Dont crack

$
0
0
i have problem in hashtopus

i use this task (-a 3 #HL# ?a?a) for cracking a 2 character hash
(4124bc0a9335c27f086f24ba207a4912=aa)

and nothing are cracked!!!!!!!!!!!!!!

---------------------------------------------------------------------------------------------
Loading task...failed: No active tasks.
Loading task...assigned to 2, hashlist 1 (continue)
Downloading hashlist 1...34 bytes
Requesting chunk...keyspace measuring required
Measuring keyspace...95
Uploading keyspace size...Accepted
Requesting chunk...benchmark required (10s)
Benchmarking task for 10s...9025/9025
Uploading benchmark result...Accepted (95)
Requesting chunk...received 1 (S: 0, L:95)
Creating zap directory...
Hashcat subprocess started at 18:35:36
[9025/9025] Uploading 37 b.Hashcat subprocess finished at 18:35:38 (2s)
Waiting for unfinished HTTP connections.....HTTP >> <br />

OK
---------------------------------------------------------------------------------------------
thank you..
↧

RAR support?

$
0
0
I've seen a feature request for cracking RAR files and that it was accepted 5 months ago. But has it already been implemented or any updates concerning this?
↧

i got this error

$
0
0
i got this error
what am i doing wrong
this is my line
H:\cuda\cudaHashcat32.exe -m 0 -o cracked.txt --remove hash.txt wordlists
the hash file is filled with md5 hashses,the wordlist fike is ok

[Image: hash.jpg]
free photo hosting
↧

oclHashcat on desktop apu and decryt

$
0
0
i would like to know which is the correct command line for decrypt a sha512 hash file
Code:
./oclHashcat-1.36/oclHashcat64.bin -m 1800 -a 3 -o found file.hash --force -i ?a?a?a?a?a?a ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a --powertune-enable
searching for plain text that is between 6 and 15 with no more thant 3 subsequent similar chars . thanks for help in forward.
↧
↧

error msg on desktop amd A8-5500 apu trinity based

$
0
0
Code:
hp@hp-desktop:~$ ./oclHashcat-1.36/oclHashcat64.bin -m 1800 -a 3 -o found file.hash -i --increment-min 8 --increment-max 18 ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a --powertune-enable
oclHashcat v1.36 starting...

WARN: ADL_Overdrive6_FanSpeed_Get(): -1

Device #1: Devastator, 2048MB, 760Mhz, 4MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c

ATTENTION! The installed GPU driver in your system is known to be broken!
It will pass over cracked hashes and does not report them as cracked
You are STRONGLY encouraged not to use it
You can use --force to override this but do not post error reports if you do so
this is the message i got on my apu 5500 with 7560D igpu trinity based processor 3.2Ghz with boost state @3.7Ghz (boost not working)
↧

NTLM Issues [Solved]

$
0
0
I seem to be having an issue with cracking some of my NTLM hashes.

Currently I have dumped a 2008R2 SAM using VSS in combination with QwarksPWDump util to get it into a txt file.

They appear like this example:
PHP Code:
user:4265:AA############################EE:18####################F1D2A5CB06::: 

I have removed:
PHP Code:
user:salt_idk?:AA############################EE: 

Leaving me with what I think is the NTLM:
PHP Code:
18####################F1D2A5CB06 

I use the following command:
Code:
cudaHashcat64.exe -m 1000 -o recovered.txt hashes.txt wordlist.txt

I am unable to crack any of the passwords even though I have set my own password in AD manually and placed it in the wordlist.txt I did add in the example hashcat NTLM and it was able to retrieve it fine. I dont get any errors either about line length.

My impression is that the export is suspect. Any ideas?
↧

Prince attack with mask

$
0
0
Hi,

I can't get the prince attack to work with a custom charset/mask. Is this expected behaviour?

Regards MG
↧

980 TI Bench

$
0
0
New to this, but thought I would attempt to contribute. The Titan X currently is the fastest card, but its MSRP is $1000...being sold for almost $1100 + on many sites (as of writing this).

[Image: 980ti.jpg]


The 980 Ti base model retails for $650. Specs are located at (hxxp://www.geforce.com/hardware/desktop-gpus/geforce-gtx-980-ti/specifications)

However, when using EVGA Precision X, it shows 1201 MHz not 1076? Anyway here was the bench.

Command used
Code:
cudahashcat64.exe -b > Bench.txt

Code:
cudaHashcat v1.36 starting in benchmark-mode...

Device #1: GeForce GTX 980 Ti, 6144MB, 1076Mhz, 22MCU

Hashtype: MD4
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 27408.9 MH/s

Hashtype: MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 13768.7 MH/s

Hashtype: SHA1
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4454.3 MH/s

Hashtype: SHA256
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1754.7 MH/s

Hashtype: SHA384
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   586.5 MH/s

Hashtype: SHA512
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   585.0 MH/s

Hashtype: SHA-3(Keccak)
Workload: 128 loops, 256 accel

Speed.GPU.#1.:   392.1 MH/s

Hashtype: RipeMD160
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  2824.1 MH/s

Hashtype: Whirlpool
Workload: 512 loops, 32 accel

Speed.GPU.#1.:   132.1 MH/s

Hashtype: GOST R 34.11-94
Workload: 512 loops, 64 accel

Speed.GPU.#1.:   116.2 MH/s

Hashtype: SAP CODVN B (BCODE)
Workload: 1024 loops, 64 accel

Speed.GPU.#1.:  1136.7 MH/s

Hashtype: SAP CODVN F/G (PASSCODE)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   586.9 MH/s

Hashtype: SAP CODVN H (PWDSALTEDHASH) iSSHA-1
Workload: 1024 loops, 16 accel

Speed.GPU.#1.:  3495.5 kH/s

Hashtype: Lotus Notes/Domino 5
Workload: 256 loops, 32 accel

Speed.GPU.#1.:   115.6 MH/s

Hashtype: Lotus Notes/Domino 6
Workload: 256 loops, 32 accel

Speed.GPU.#1.: 38115.7 kH/s

Hashtype: Lotus Notes/Domino 8
Workload: 1024 loops, 64 accel

Speed.GPU.#1.:   386.0 kH/s

Hashtype: SHA-1(Base64), nsldap, Netscape LDAP SHA
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4449.1 MH/s

Hashtype: SSHA-1(Base64), nsldaps, Netscape LDAP SSHA
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4443.3 MH/s

Hashtype: descrypt, DES(Unix), Traditional DES
Workload: 128 loops, 64 accel

Speed.GPU.#1.:   123.6 MH/s

Hashtype: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
Workload: 1000 loops, 32 accel

Speed.GPU.#1.:  6218.7 kH/s

Hashtype: sha256crypt, SHA256(Unix)
Workload: 1024 loops, 4 accel

Speed.GPU.#1.:   262.9 kH/s

Hashtype: sha512crypt, SHA512(Unix)
Workload: 1024 loops, 8 accel

Speed.GPU.#1.:   102.8 kH/s

Hashtype: bcrypt, Blowfish(OpenBSD)
Workload: 32 loops, 2 accel

Speed.GPU.#1.:    11718 H/s

Hashtype: LM
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1917.1 MH/s

Hashtype: NTLM
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 27299.5 MH/s

Hashtype: DCC, mscash
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  7939.6 MH/s

Hashtype: NetNTLMv1-VANILLA / NetNTLMv1+ESS
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 12651.9 MH/s

Hashtype: NetNTLMv2
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:   939.9 MH/s

Hashtype: Kerberos 5 AS-REQ Pre-Auth etype 23
Workload: 256 loops, 32 accel

Speed.GPU.#1.:   160.1 MH/s

Hashtype: EPiServer 6.x < v4
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  3355.0 MH/s

Hashtype: EPiServer 6.x > v4
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  1606.0 MH/s

Hashtype: MSSQL(2000)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  4429.3 MH/s

Hashtype: MSSQL(2005)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  4429.7 MH/s

Hashtype: MSSQL(2012)
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   576.4 MH/s

Hashtype: MySQL323
Workload: 512 loops, 256 accel

Speed.GPU.#1.: 32074.1 MH/s

Hashtype: MySQL4.1/MySQL5
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  2102.6 MH/s

Hashtype: Oracle 7-10g
Workload: 512 loops, 64 accel

Speed.GPU.#1.:   315.8 MH/s

Hashtype: Sybase ASE
Workload: 512 loops, 32 accel

Speed.GPU.#1.:   148.5 MH/s

Hashtype: Oracle 11g/12c
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4444.5 MH/s

Hashtype: PostgreSQL Challenge-Response Authentication (MD5)
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  3700.6 MH/s

Hashtype: MySQL Challenge-Response Authentication (SHA1)
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1335.0 MH/s

Hashtype: OSX v10.4, v10.5, v10.6
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  3346.5 MH/s

Hashtype: OSX v10.7
Workload: 128 loops, 256 accel

Speed.GPU.#1.:   570.6 MH/s

Hashtype: OSX v10.8+
Workload: 1024 loops, 2 accel

Speed.GPU.#1.:     7509 H/s

Hashtype: Android PIN
Workload: 1024 loops, 16 accel

Speed.GPU.#1.:  3491.9 kH/s

Hashtype: Android FDE <= 4.3
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   486.2 kH/s

Hashtype: scrypt
Workload: 1 loops, 64 accel

Speed.GPU.#1.:   239.5 kH/s

Hashtype: Cisco-PIX MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  8795.3 MH/s

Hashtype: Cisco-ASA MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  9236.1 MH/s

Hashtype: Cisco-IOS SHA256
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1754.0 MH/s

Hashtype: Cisco $8$
Workload: 1024 loops, 8 accel

Speed.GPU.#1.:    39732 H/s

Hashtype: Cisco $9$
Workload: 1 loops, 4 accel

Speed.GPU.#1.:     1980 H/s

Hashtype: Juniper IVE
Workload: 1000 loops, 32 accel

Speed.GPU.#1.:  6219.2 kH/s

Hashtype: Citrix NetScaler
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  4186.1 MH/s

Hashtype: DNSSEC (NSEC3)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  1941.0 MH/s

Hashtype: WPA/WPA2
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   239.6 kH/s

Hashtype: IKE-PSK MD5
Workload: 512 loops, 128 accel

Speed.GPU.#1.:   640.7 MH/s

Hashtype: IKE-PSK SHA1
Workload: 512 loops, 128 accel

Speed.GPU.#1.:   335.3 MH/s

Hashtype: Password Safe v2
Workload: 1000 loops, 16 accel

Speed.GPU.#1.:   277.4 kH/s

Hashtype: Password Safe v3
Workload: 1024 loops, 16 accel

Speed.GPU.#1.:   769.8 kH/s

Hashtype: 1Password, agilekeychain
Workload: 1000 loops, 64 accel

Speed.GPU.#1.:  1911.6 kH/s

Hashtype: 1Password, cloudkeychain
Workload: 1024 loops, 2 accel

Speed.GPU.#1.:     6571 H/s

Hashtype: AIX {ssha1}
Workload: 64 loops, 128 accel

Speed.GPU.#1.: 24828.1 kH/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES
Workload: 1024 loops, 64 accel

Speed.GPU.#1.:   707.2 kH/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-SHA512 + AES
Workload: 1000 loops, 16 accel

Speed.GPU.#1.:   268.8 kH/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + AES
Workload: 1000 loops, 8 accel

Speed.GPU.#1.:    25410 H/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES + boot-mode
Workload: 1000 loops, 64 accel

Speed.GPU.#1.:  1397.8 kH/s

Hashtype: Office 2007
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:    78865 H/s

Hashtype: Office 2010
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:    39485 H/s

Hashtype: Office 2013
Workload: 1024 loops, 4 accel

Speed.GPU.#1.:     5753 H/s

Hashtype: MS Office <= 2003 MD5 + RC4, oldoffice$0, oldoffice$1
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   120.2 MH/s

Hashtype: MS Office <= 2003 SHA1 + RC4, oldoffice$3, oldoffice$4
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   204.4 MH/s

Hashtype: PDF 1.1 - 1.3 (Acrobat 2 - 4)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   224.0 MH/s

Hashtype: PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #1
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   250.3 MH/s

Hashtype: PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #2
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:  2220.2 MH/s

Hashtype: PDF 1.4 - 1.6 (Acrobat 5 - 8)
Workload: 70 loops, 256 accel

Speed.GPU.#1.: 10560.6 kH/s

Hashtype: PDF 1.7 Level 3 (Acrobat 9)
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1754.8 MH/s

Hashtype: PDF 1.7 Level 8 (Acrobat 10 - 11)
Workload: 64 loops, 8 accel

Speed.GPU.#1.:        0 H/s

Hashtype: Drupal7
Workload: 1024 loops, 8 accel

Speed.GPU.#1.:    34636 H/s

Hashtype: HMAC-MD5 (key = $pass)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  1406.9 MH/s

Hashtype: HMAC-MD5 (key = $salt)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  4230.3 MH/s

Hashtype: HMAC-SHA1 (key = $pass)
Workload: 256 loops, 256 accel

Speed.GPU.#1.:        0 H/s

Hashtype: HMAC-SHA1 (key = $salt)
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   495.6 MH/s

Hashtype: HMAC-SHA256 (key = $pass)
Workload: 128 loops, 128 accel

Speed.GPU.#1.:   362.9 MH/s

Hashtype: HMAC-SHA256 (key = $salt)
Workload: 128 loops, 128 accel

Speed.GPU.#1.:   740.8 MH/s

Hashtype: HMAC-SHA512 (key = $pass)
Workload: 128 loops, 128 accel

Speed.GPU.#1.: 87388.5 kH/s

Hashtype: HMAC-SHA512 (key = $salt)
Workload: 128 loops, 128 accel

Speed.GPU.#1.:   265.1 MH/s

Hashtype: IPMI2 RAKP HMAC-SHA1
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   972.4 MH/s

Hashtype: Half MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  8513.4 MH/s

Hashtype: Double MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4208.8 MH/s

Hashtype: GRUB 2
Workload: 1024 loops, 2 accel

Speed.GPU.#1.:    26252 H/s

Hashtype: phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:  3962.1 kH/s

Hashtype: SIP digest authentication (MD5)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:  1659.4 MH/s

Hashtype: SipHash
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 18147.1 MH/s

Hashtype: Joomla < 2.5.18
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 13743.8 MH/s

Hashtype: osCommerce, xt:Commerce
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  8341.4 MH/s

Hashtype: PrestaShop
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4960.1 MH/s

Hashtype: IPB2+, MyBB1.2+
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1828.1 MH/s

Hashtype: vBulletin < v3.8.5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4209.8 MH/s

Hashtype: PHPS
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4208.5 MH/s

Hashtype: vBulletin > v3.8.5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1787.5 MH/s

Hashtype: SMF > v1.1
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  3356.6 MH/s

This is with a +250 which put it at 1451 MHz

Code:
cudaHashcat v1.36 starting in benchmark-mode...

Device #1: GeForce GTX 980 Ti, 6144MB, 1076Mhz, 22MCU

Hashtype: MD4
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 32984.8 MH/s

Hashtype: MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 16640.0 MH/s

Hashtype: SHA1
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5373.8 MH/s

Hashtype: SHA256
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  2123.0 MH/s

Hashtype: SHA384
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   709.2 MH/s

Hashtype: SHA512
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   707.1 MH/s

Hashtype: SHA-3(Keccak)
Workload: 128 loops, 256 accel

Speed.GPU.#1.:   468.0 MH/s

Hashtype: RipeMD160
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  3411.6 MH/s

Hashtype: Whirlpool
Workload: 512 loops, 32 accel

Speed.GPU.#1.:   159.5 MH/s

Hashtype: GOST R 34.11-94
Workload: 512 loops, 64 accel

Speed.GPU.#1.:   140.3 MH/s

Hashtype: SAP CODVN B (BCODE)
Workload: 1024 loops, 64 accel

Speed.GPU.#1.:  1368.9 MH/s

Hashtype: SAP CODVN F/G (PASSCODE)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   680.0 MH/s

Hashtype: SAP CODVN H (PWDSALTEDHASH) iSSHA-1
Workload: 1024 loops, 16 accel

Speed.GPU.#1.:  4187.2 kH/s

Hashtype: Lotus Notes/Domino 5
Workload: 256 loops, 32 accel

Speed.GPU.#1.:   139.6 MH/s

Hashtype: Lotus Notes/Domino 6
Workload: 256 loops, 32 accel

Speed.GPU.#1.: 46071.7 kH/s

Hashtype: Lotus Notes/Domino 8
Workload: 1024 loops, 64 accel

Speed.GPU.#1.:   465.2 kH/s

Hashtype: SHA-1(Base64), nsldap, Netscape LDAP SHA
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5372.5 MH/s

Hashtype: SSHA-1(Base64), nsldaps, Netscape LDAP SSHA
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5375.4 MH/s

Hashtype: descrypt, DES(Unix), Traditional DES
Workload: 128 loops, 64 accel

Speed.GPU.#1.:   149.4 MH/s

Hashtype: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
Workload: 1000 loops, 32 accel

Speed.GPU.#1.:  7476.2 kH/s

Hashtype: sha256crypt, SHA256(Unix)
Workload: 1024 loops, 4 accel

Speed.GPU.#1.:   317.6 kH/s

Hashtype: sha512crypt, SHA512(Unix)
Workload: 1024 loops, 8 accel

Speed.GPU.#1.:   124.1 kH/s

Hashtype: bcrypt, Blowfish(OpenBSD)
Workload: 32 loops, 2 accel

Speed.GPU.#1.:    14133 H/s

Hashtype: LM
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  2316.7 MH/s

Hashtype: NTLM
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 32987.3 MH/s

Hashtype: DCC, mscash
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  9594.6 MH/s

Hashtype: NetNTLMv1-VANILLA / NetNTLMv1+ESS
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 15299.7 MH/s

Hashtype: NetNTLMv2
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1138.2 MH/s

Hashtype: Kerberos 5 AS-REQ Pre-Auth etype 23
Workload: 256 loops, 32 accel

Speed.GPU.#1.:   194.7 MH/s

Hashtype: EPiServer 6.x < v4
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  4053.2 MH/s

Hashtype: EPiServer 6.x > v4
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  1942.9 MH/s

Hashtype: MSSQL(2000)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  5352.4 MH/s

Hashtype: MSSQL(2005)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  5352.5 MH/s

Hashtype: MSSQL(2012)
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   696.9 MH/s

Hashtype: MySQL323
Workload: 512 loops, 256 accel

Speed.GPU.#1.: 38708.7 MH/s

Hashtype: MySQL4.1/MySQL5
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  2542.9 MH/s

Hashtype: Oracle 7-10g
Workload: 512 loops, 64 accel

Speed.GPU.#1.:   380.1 MH/s

Hashtype: Sybase ASE
Workload: 512 loops, 32 accel

Speed.GPU.#1.:   179.2 MH/s

Hashtype: Oracle 11g/12c
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5375.0 MH/s

Hashtype: PostgreSQL Challenge-Response Authentication (MD5)
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  4480.6 MH/s

Hashtype: MySQL Challenge-Response Authentication (SHA1)
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  1612.4 MH/s

Hashtype: OSX v10.4, v10.5, v10.6
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  4052.2 MH/s

Hashtype: OSX v10.7
Workload: 128 loops, 256 accel

Speed.GPU.#1.:   689.8 MH/s

Hashtype: OSX v10.8+
Workload: 1024 loops, 2 accel

Speed.GPU.#1.:     9078 H/s

Hashtype: Android PIN
Workload: 1024 loops, 16 accel

Speed.GPU.#1.:  4196.3 kH/s

Hashtype: Android FDE <= 4.3
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   586.5 kH/s

Hashtype: scrypt
Workload: 1 loops, 64 accel

Speed.GPU.#1.:   285.0 kH/s

Hashtype: Cisco-PIX MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 10618.7 MH/s

Hashtype: Cisco-ASA MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 11152.6 MH/s

Hashtype: Cisco-IOS SHA256
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  2122.6 MH/s

Hashtype: Cisco $8$
Workload: 1024 loops, 8 accel

Speed.GPU.#1.:    48081 H/s

Hashtype: Cisco $9$
Workload: 1 loops, 4 accel

Speed.GPU.#1.:     2402 H/s

Hashtype: Juniper IVE
Workload: 1000 loops, 32 accel

Speed.GPU.#1.:  7467.6 kH/s

Hashtype: Citrix NetScaler
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  5063.0 MH/s

Hashtype: DNSSEC (NSEC3)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  2347.3 MH/s

Hashtype: WPA/WPA2
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   289.3 kH/s

Hashtype: IKE-PSK MD5
Workload: 512 loops, 128 accel

Speed.GPU.#1.:   773.4 MH/s

Hashtype: IKE-PSK SHA1
Workload: 512 loops, 128 accel

Speed.GPU.#1.:   404.2 MH/s

Hashtype: Password Safe v2
Workload: 1000 loops, 16 accel

Speed.GPU.#1.:   332.1 kH/s

Hashtype: Password Safe v3
Workload: 1024 loops, 16 accel

Speed.GPU.#1.:   932.9 kH/s

Hashtype: 1Password, agilekeychain
Workload: 1000 loops, 64 accel

Speed.GPU.#1.:  2302.1 kH/s

Hashtype: 1Password, cloudkeychain
Workload: 1024 loops, 2 accel

Speed.GPU.#1.:     7942 H/s

Hashtype: AIX {ssha1}
Workload: 64 loops, 128 accel

Speed.GPU.#1.: 29179.7 kH/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES
Workload: 1024 loops, 64 accel

Speed.GPU.#1.:   852.3 kH/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-SHA512 + AES
Workload: 1000 loops, 16 accel

Speed.GPU.#1.:   324.8 kH/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + AES
Workload: 1000 loops, 8 accel

Speed.GPU.#1.:    30743 H/s

Hashtype: TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES + boot-mode
Workload: 1000 loops, 64 accel

Speed.GPU.#1.:  1684.1 kH/s

Hashtype: Office 2007
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:    95350 H/s

Hashtype: Office 2010
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:    47735 H/s

Hashtype: Office 2013
Workload: 1024 loops, 4 accel

Speed.GPU.#1.:     6946 H/s

Hashtype: MS Office <= 2003 MD5 + RC4, oldoffice$0, oldoffice$1
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   145.2 MH/s

Hashtype: MS Office <= 2003 SHA1 + RC4, oldoffice$3, oldoffice$4
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   247.0 MH/s

Hashtype: PDF 1.1 - 1.3 (Acrobat 2 - 4)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   270.8 MH/s

Hashtype: PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #1
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:   301.8 MH/s

Hashtype: PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #2
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:  2678.0 MH/s

Hashtype: PDF 1.4 - 1.6 (Acrobat 5 - 8)
Workload: 70 loops, 256 accel

Speed.GPU.#1.: 12588.6 kH/s

Hashtype: PDF 1.7 Level 3 (Acrobat 9)
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  2123.5 MH/s

Hashtype: PDF 1.7 Level 8 (Acrobat 10 - 11)
Workload: 64 loops, 8 accel

Speed.GPU.#1.:        0 H/s

Hashtype: Drupal7
Workload: 1024 loops, 8 accel

Speed.GPU.#1.:    41879 H/s

Hashtype: HMAC-MD5 (key = $pass)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  1694.8 MH/s

Hashtype: HMAC-MD5 (key = $salt)
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  5110.0 MH/s

Hashtype: HMAC-SHA1 (key = $pass)
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   376.1 MH/s

Hashtype: HMAC-SHA1 (key = $salt)
Workload: 256 loops, 256 accel

Speed.GPU.#1.:   597.2 MH/s

Hashtype: HMAC-SHA256 (key = $pass)
Workload: 128 loops, 128 accel

Speed.GPU.#1.:   438.8 MH/s

Hashtype: HMAC-SHA256 (key = $salt)
Workload: 128 loops, 128 accel

Speed.GPU.#1.:   896.1 MH/s

Hashtype: HMAC-SHA512 (key = $pass)
Workload: 128 loops, 128 accel

Speed.GPU.#1.:   105.4 MH/s

Hashtype: HMAC-SHA512 (key = $salt)
Workload: 128 loops, 128 accel

Speed.GPU.#1.:   320.4 MH/s

Hashtype: IPMI2 RAKP HMAC-SHA1
Workload: 256 loops, 256 accel

Speed.GPU.#1.:  1176.4 MH/s

Hashtype: Half MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 10289.3 MH/s

Hashtype: Double MD5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5033.3 MH/s

Hashtype: GRUB 2
Workload: 1024 loops, 2 accel

Speed.GPU.#1.:    31738 H/s

Hashtype: phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:  4768.7 kH/s

Hashtype: SIP digest authentication (MD5)
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:  2004.0 MH/s

Hashtype: SipHash
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 21871.4 MH/s

Hashtype: Joomla < 2.5.18
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 16438.9 MH/s

Hashtype: osCommerce, xt:Commerce
Workload: 1024 loops, 256 accel

Speed.GPU.#1.: 10071.2 MH/s

Hashtype: PrestaShop
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5933.2 MH/s

Hashtype: IPB2+, MyBB1.2+
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  2202.3 MH/s

Hashtype: vBulletin < v3.8.5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5077.0 MH/s

Hashtype: PHPS
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  5031.2 MH/s

Hashtype: vBulletin > v3.8.5
Workload: 1024 loops, 256 accel

Speed.GPU.#1.:  2153.5 MH/s

Hashtype: SMF > v1.1
Workload: 512 loops, 256 accel

Speed.GPU.#1.:  4046.1 MH/s
↧
↧

Error cuMemcpyDtoh 999

$
0
0
Works just fine until I try to do cudaHashcat64.exe -b --benchmark-mode=1


Anybody know this?
↧

What's wrong? [noob]

$
0
0
hi all i am trying to learn how to use hashcat...

now i just installed oclhashcat but i got an error:

root@kali:~# oclhashcat -m 4700 -a 3 -o cracked.txt hash.hash -1 ?l?d?u?s ?1?1?1?1?1?1?1?1
oclHashcat v1.36 starting...

WARNING: Hash 'hash.hash': Line-length exception


ERROR: No hashes loaded

root@kali:~# hashcat -m 4700 -a 3 -o cracked.txt hash.hash -1 ?l?d?u?s ?1?1?1?1?1?1?1?1
Initializing hashcat v0.49 with 4 threads and 32mb segment-size...

Added hashes from file hash.hash: 1 (1 salts)


---------------------
as you can see with the same hash and the same command i got this problem, any idea how to solve this?
thank you
↧

hashcat v0.50

$
0
0


Download here: https://hashcat.net/hashcat/



Most important added features:
  • Hashcat has now a new status prompt similar to oclHashcat
  • Added support for bypass
  • Added support for --status, --status-timer and --status-automat
  • Added support to use --username together with --show and also --username together with --remove
  • The built-in PRINCE attack mode was updated to the latest version on github
  • PRINCE attack now also supports -s and -l
  • avx/avx2 binaries were removed from the package (for the time being) because the binaries did not contain optimized avx/avx2 code

New algorithms:
  • PrestaShop
  • SIP digest authentication (MD5)
  • MySQL Secure Password Authentication
  • PostgreSQL Challenge-Response Authentication (MD5)

Full changelog v0.49 -> v0.50

Quote:

type: feature
file: hashcat-cli
desc: added support for -m 11000 = PrestaShop
trac: #589

type: feature
file: hashcat-cli
desc: added support for -m 11100 = PostgreSQL Challenge-Response Authentication (MD5)
trac: #490

type: feature
file: hashcat-cli
desc: added support for -m 11200 = MySQL Secure Password Authentication
trac: #541

type: feature
file: hashcat-cli
desc: added support for -m 11400 = SIP digest authentication (MD5)
trac: #539

type: feature
file: hashcat-cli
desc: added interactive mode with prompt
trac: #569

type: feature
file: hashcat-cli
desc: implemented bypass mode for straight, combination, toggle-case, permuatation and table-lookup attack modes
trac: #570

type: feature
file: hashcat-cli
desc: added support for --status-automat i.e. making the status output machine-readable
trac: #534

type: feature
file: hashcat-cli
desc: implemented --status and --status-timer which allows to configure the time in seconds for periodic status updates
trac: #571

type: feature
file: hashcat-cli
desc: added support for --username when using --show
trac: #567

type: feature
file: hashcat-cli
desc: added support for --username when using --remove
trac: #568

type: feature
file: hashcat-cli
desc: backported latest prince-attack code from github version

type: feature
file: hashcat-cli
desc: added missing -s and -l support for prince-attack
trac: #584

type: feature
file: hashcat-cli
desc: added support for hashcat mask files (.hcmask)
trac: #586

type: feature
file: hashcat-cli
desc: new workaround for -m 2500 = WPA/WPA2 key versions which are not valid (should always be < 256)

type: change
file: hashcat-cli
desc: dropped avx/avx2 binaries as they do not really contain avx/avx2 code

type: change
file: hashcat-cli
desc: increment mode disabled by default, --increment switch must be used now for increment mode
trac: #572

type: change
file: hashcat-cli
desc: renamed -a 6 prince-attack to -a 8 prince-attack

type: change
file: hashcat-cli
desc: renamed -m 112 Oracle 11g/12c to -m 112 Oracle S: Type (Oracle 11+)

type: change
file: hashcat-cli
desc: renamed -m 3810 = md5($salt.$pass.$salt) to -m 3800 = md5($salt.$pass.$salt)

type: change
file: hashcat-cli
desc: renamed -m 4710 = sha1($salt.$pass.$salt) to -m 4900 = sha1($salt.$pass.$salt)

type: change
file: hashcat-cli
desc: renamed -m 7100 = OS X v10.8 / v10.9 to OS X v10.8+

type: change
file: hashcat-cli
desc: synchronized default value for PRINCE attack-mode parameters with princeprocessor

type: bug
file: hashcat-cli
desc: fixed --runtime under windows in PRINCE attack mode
trac: #555

type: bug
file: hashcat-cli
desc: in PRINCE attack-mode removed unwanted dupes in --stdout mode

type: bug
file: hashcat-cli
desc: In PRINCE attack-mode fixed a memory leak

type: bug
file: hashcat-cli
desc: added additional checks for hexadecimal values supplied in masks by using the --hex-charset switch
trac: #610

type: bug
file: hashcat-cli
desc: fixed --remove feature in single-hash mode
trac: #553

type: bug
file: hashcat-cli
desc: fixed problem in combinator attack, duplicates were sometimes in the output
trac: #228
↧
Viewing all 7673 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>