Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7673 articles
Browse latest View live

wrong temperature assignment

$
0
0
Hello!

Today after updating one of my rigs i noticed that oclHashcat does not read right temperature.
Build: 4x HD 5970, ubuntu 12.04.4 LTS, oclHashcat 1.36, Catalyst 14.9


What happens:

I start cracking with device 1 and 2 only.  Speed.GPU.#* is reported properly, while HWMon.GPU.#1 and HWMon.GPU.#2 are actually from devices 7 and 8 (% Util, temp and fan).
Generally, it is not a problem as i allways use all GPUs- watchdog see all cards-, but i do want to know if there is something i can do about it.
I noticed this today while performing performance check- as after every update (1.31 --> 1.36)

Picture:
On left, hashcat 1.36, on right my custom temp/fan reporting script.
It can be seen what i descriebed above (note: in my temp/fan script, numbers are inverted!)

[Image: screenshot-from-2015-07-.jpg]
Click to enlarge

I did new system setup, problem keeps occuring

Looking for the best setup for 500kh/s or 1000kh/s on WPA/WPA2

$
0
0
Hey, I have a buddy who is looking to set up his first cracking rig, primarily for WPA/WPA cracking. There are so many options today, so he is looking for a good recommendation to reach one of the two scenarios (probably based on the cost) to reach either 500kh/s or 1000kh/s.

We both have been looking at a TON of hardware options, but would like a more experienced user's input for motherboards, GPUs, power supplies etc. So what do you think is the most cost effective setup for both of the 2 goals?

Any questions, just ask Smile

Nvidia Learning Curve

$
0
0
I purchased a reference design GTX 970 card last night from best buy.  First time using Nvidia products and confused how I can control fan speed and overclocking on Ubunut 14.04.  

My understanding is there are two methods 1) install windows and flash the bios or 2) modify xorg.conf ?  Are there no easier options to adjust fan speed and clock, like AMD's "aticonfig" tool?  

If I'm limited to using those two methods are there anything "gotchas" I should look out for?  Last thing I need is to brick a brand new card by flashing the bios incorrectly.

With that said.  While testing last night GPU temp was around 80c @ 50% fan speed during a bruteforce of dummy MD5 hash.  However hashcat's speed kept going up and down which made me think the card is throttling?  Personally I like the temp to be lower, especially once I get more of these cards.

line length exception, and yes I read the FAQ

$
0
0
I have been working with hashcat for about a week now and have it running on my local box as well as a couple of EC2 instances.  I wanted to run a simple test with a 4 character password protected 7z archive to make sure all this work and computation I was shoving at this archive of mine I was trying to get into wasn't all for not and I was approaching this correctly.

So I created a 7z archive with a 4 character password, file names not encrypted, just like the archive I was trying to crack.  I ran it through 7z2hashcat.pl and saved the output to file.

When I try to run cudahashcat64, I get a line length exception.  I read the faq, checked for white space, I know I am using the correct hash type, and there is no username in the hash.  I know the file is there, and have been running hashcat with the same reference to other files without issue.  I even put the hash directly in the commandline:

cudahashcat64 -a 3 "<hash>" test.hcmask -w 2

I looked at the hash and it appears to be one character shorter then the one from the archive I am tyring to crack.  I don't know if that is because I used a shorter password or what.  I pulled the hash twice just to make sure.

Any idea what is going on?  Please help, thanks.

markov threshold for second run through

$
0
0
If I have a hash I am trying to crack, and I am unable to crack it using a markov-threshold=10, is it possible to run against it again using markov-threshold=25, but somehow exclude the combinations checked in the first run through to save time?

axcrypt

$
0
0
can i bruteforce a axcrypt file?

Cant extract hash from JTR for wallet.dat

$
0
0
I am using bitcoin2john.py and every single time I get this error..


ERROR:root:22:Invalid argument -- bitcoin2jo
hn.py: unexpected file type or format
ERROR:root:Couldn't open wallet.dat/main. Try quitting Bitcoin and running this
again.


I have tried running it on a VM even with the same end result.. I have tried with a completely fresh encrypted wallet.dat..

same result everytime.. was just wondering if anybody has any idea on what to do so I can import into ocl

trying to put oclhashcat on mint linux.

$
0
0
I have downloaded the version and have extracted a folder that contains lots of stuff. it has .exe's and windows logos everywhere but wine isnt opening them.

How would i properly install oclhashcat on mint linux?

Need help cracking a wpa2 handshake

$
0
0
I am trying to crack a 8 digit, lower case password, I normally brute force these within 1 day with 5 x 29 290x.

Today I learned that the passwords don't contain the characters I and o, and I could speed up my attack if I could get hashcat to ignore/skip those 2 characters.

Is this possible with the brute force attack or will I have to use a dictionary?
I don't even know what a rule based attack is so I hope this isnt going to be complicated.

thanks

BUG IN CPU HASHCAT I THINK OR I MISCALCULATED

$
0
0
HeLLo I AM NEW To Hashcat But In My Project I Found That (CPU Hashcat) Is not able to calculate...Or this Is My Miscalculation Somewhere...please if Yes Please Guide me...!! (Bug Or Miscalculation ??)

My project for CPU Hashcat :- Table look up Attack Mode 5

 Example:-
my sha256 hash of 2-aacaca is fa02bbff7a5cf03e199a04b794a5cab1f4cc887849f661ac2a34024f668893d1
---------------------
My Hash File (hash) contains.
fa02bbff7a5cf03e199a04b794a5cab1f4cc887849f661ac2a34024f668893d1

My Table file (Table1) contains. {limited}
 a=aa
a=ba
a=ca
a=da
a=ea

My Dictionary File (Dic) Contains.
2-aaa

So i PUT:- hashcat -m 1400 -a 5 -t Table1.txt hash.txt Dic.txt
It cracked..giving me answer 2-aacaca

[Image: 2zexuvd.jpg]

-------------
But When I replaced Same Table With Table2 with All combinations of MixAlpha+Numeric
(Table2) File
a=aa
a=ba
a=ca
a=da
.
.
a=AA
a=BA
.
a=9A
a=99

So I PUT :- hashcat -m 1400 -a 5 -t Table2.txt hash.txt Dic.txt
It Didn't Gave Me the answer ???  Why??

[Image: dy93rl.jpg]

IS THIS A BUG OR Miscalculation.....Please Guide me...Is I made a mistake Anywhere..??

HELP ME ...

which ubuntu version?

$
0
0
In ubuntu 14.04.2 they upgraded Xorg to 1.16.. Google says catalyst 14.9 is not compatible with xorg 1.16 and would explain why I'm having so much trouble with lightdm booting (hangs at a purple screen, other times black screen).

Then I upgraded to catalyst 15.20, lightdm loaded and all is well with the computer again.  However hashcat 1.36 doesn't like catalyst 15.20.  It also hangs on random hashtype during benchmark and having to use --force is not desirable .

Tried hashcat beta and that also crashed during benchmark as well, but at least --force isn't needed. 

So what to do?  Should I down rev to ubuntu 14.04.0?  Anyone know if xorg will try to update itself?  I've spend hours on this today and would hate to waste more time if down revving doesn't help.

best rule combination yet!

$
0
0
Hello,

I thought i would share this.

After many tests by rules to recover as many plains in fast time i found this rule combination best yet at least for me.

Run rule1 and rule2 same time in hashcat & enjoy. (you can also run your fav rule with rule1, works perfect.)

the rules:

https://hostr.co/7bcNuCfFzJUW

rules file for download or best of the rule files that come with the software

$
0
0
I am still trying to get into a 7z archive I password protected a couple of years ago.  I'm pretty sure the password is too long for a plain brute force attack, so I have tried using markov chains and thresholds, and now that that yeilded no results, I am trying the following:

I have created a file with all the passwords I use as well as typical permutations and am trying rules like best64.rule.  I am just wondering if there are any better rule sets out there.  All the google results on the hashcat site are broken links.  Does anyone know a source?

Barring that, which of the rule files that come with the software do you recommend?  Thank you.

Can I get this workload to use four gpus?

$
0
0
Assuming:

Dictionary with four words.

.hcmask with the following:
?a?a?a
?a?a?a?a

Command line like so:
./cudaHashcat64.bin -m 11600 outfile.hash my.dict my.hcmask --status --status-timer=30 -o wedidit.txt --session=four -a 6 -w 3

Four GPU machine.

Is there any way to get all four GPUs in use?  All I get is one at 99%, and this is going to take for ever.  I have played with loops=1024 and accel=10 but it has no effect.

Thank you.

can't figure this out with maskprocessor.

$
0
0
I have tried this out with both 64 and 32.

I am just trying to generate a file from a mask combination, just wanted to see if it would be faster that using a mask attack.  If someone knows, they can just let me know.

But know I just want to know what I am doing wrong.

Here is my command line:

C:\mp>mp64 -o 1.dict mypassword##^?a?a?a

The output is having a problem the the ^ symbol.  I am getting weird results.  Stuff like this:

The ^ shows up in the output file as missing, "1", "c", ".", etc.  I am assuming it is getting recognized as some sort of special character for some reason.

I have also tried putting just the ^ in a hcchr file and referencing it through -1.

The mask page and the mask processor docs have nothing about escape characters.  I have tried "/^", "^^", anything I could think of.

So what's going on and how do I fix this?

Thanks.

how the limit the number of guesses when cracking the password

$
0
0
I am using the Hashcat to crack the password for research. Now I have a problem about limit the number of guesses when doing the trial. I want to see how many passwords can be cracked when I limit the number of guesses to 10^15. Could I possible find a command to do this? Thank you.

Extracting binary data from TrueCrypt Boot Volume and Cracking

$
0
0
I've recently been asked to give a shot at cracking a TrueCrypt boot volume.  Having never done so before, I just wanted to sanity check what I've done.

To extract the binary data needed for the crack, I ran the following:

dd if=/dev/sdc of=/path/to/file.tc bs=1 skip=31744 count=512

Since this is a boot volume, the data should be at offset 31744 - according to the Wiki, the last sector of the first track.  We're extracting 512 bytes to give to cudaHashcat.

To crack it, we would then run:
./cudaHashcat64.bin -a 0 -m 6241 /path/to/file.tc /path/to/wordlists/

Assuming I was given the correct information and that the volume uses RIPEMD-160 and AES.

Like I said, since this is the first TrueCrypt volume I've run, I just want to make sure I did this right.  Thanks all.

New Hash Function

$
0
0
Finding out a lot more people start to use NullCrypt since there's no way to crack it yet, what do you guys think about this hashing function?

CMIYC 2015

$
0
0
Hi guys.  Just wanted to wish you all a great 48 hours of contest.  Hopefully, it's going to be a tight competition until the end.  I am eager to start although the schedule will make me miss around 8 hours in the beginning because of work.  This should give you a head start Wink

oclHashcat GPU problem

$
0
0
Hi

I've installed ATI drivers using this tutorial: http://www.blackmoreops.com/2014/03/05/i...nux-1-0-6/ . When I try oclhashcat command i get ERROR: invalid gpu_id 0 specified. oclHashcat -b gives WARN: ADL_Overdrive6_FanSpeed_Get(): -1
Device #1: Caicos, 512MB, 750Mhz, 2MCU
ATTENTION! Unsupported or incorrect installed GPU driver detected!
You are STRONGLY encouraged to use the official supported GPU driver for good reasons.

fglrxinfo command gives:
display: :0  screen: 0
OpenGL vendor string: Advanced Micro Devices, Inc.
OpenGL renderer string: AMD Radeon HD 7400M Series
OpenGL version string: 4.4.12874 Compatibility Profile Context 14.10.1006.1001

Please, help me, sorry for my poor English...
Viewing all 7673 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>