Any chance to getting a AMD Radeon (TM) R9 390 Series working with oclhashcat wanted to work a video demo of cracking wpa wireless but the Catalyst 15.7 out appears to not work I was curious if their is anything in the works to getting oclhashcat working with Catalyst 15.7 I tried using the Catalyst 14 my system won't even boot with that driver installed so guess im kinda out of luck unless someone has a work around or unless their is gonna be an update.
↧
AMD Catalyst 15.7
↧
Line Length - bitcoin wallet
nvm scrap this thread
↧
↧
Why does emulating hybrid attack with rules skip some rules/ignore numbers?
Hi,
I'm learning about hashcat rules and recently noticed an issue where some of my rules are apparently being skipped (not tested). I created a simple rules file to append a three-digit number to the end of a dictionary, super simple, beginning like this:
and going all the way to
. The idea here is to mimic a mask like
as part of a combinator attack. I expected the intended result to be a two-word combination from the dictionary followed by a three-digit number (000 to 999). However, when I test these rules, some numbers are skipped. Here's the command I used:
and notice that in this snippet of the output, there are several numbers missing, such as "971" (it goes from "widesky970" to "widesky972") and numerous others.
Why is this happening?
Also, after adding a few more rules to the beginning of my rule file (like
"do nothing" and reverse case/upper-case, etc.), then *different* numbers are skipped. Am I doing something wrong? Is this a bug?
Thanks for your help.
I'm learning about hashcat rules and recently noticed an issue where some of my rules are apparently being skipped (not tested). I created a simple rules file to append a three-digit number to the end of a dictionary, super simple, beginning like this:
Code:
$0 $0 $0
$0 $0 $1
$0 $0 $2
$0 $0 $3
$0 $0 $4
$0 $0 $5
$0 $0 $6
$0 $0 $7
$0 $0 $8
$0 $0 $9
$0 $1 $0
$0 $1 $1
$0 $1 $2
$0 $1 $3
$0 $1 $4
$0 $1 $5
$0 $1 $6
$0 $1 $7
$0 $1 $8
$0 $1 $9
and going all the way to
Code:
$9 $9 $9
Code:
?d?d?d
Code:
hashcat --stdout -a 1 -r custom.rule my-capture.hccap dictionary.txt
and notice that in this snippet of the output, there are several numbers missing, such as "971" (it goes from "widesky970" to "widesky972") and numerous others.
Code:
widesky970
widesky972
widesky973
widesky974
widesky976
widesky977
widesky978
Why is this happening?
Also, after adding a few more rules to the beginning of my rule file (like
Code:
:
Thanks for your help.
↧
Blockchain.info wallets
Any way to attack these? wallet is from 2013.
↧
R9 390x question
I noticed that the R9 390x is not in the list for compatible devices from the list in the sticky at the top of the forum (holy run on sentence Batman!). Is this card supported? The only thing I've been able to crack is a single MD5 hash that I knew the passphrase of, the rest of my generated hashes will NOT crack.
I'm wondering if it's just not supported. If not, will it ever be? Or should I just get something else?
I'm wondering if it's just not supported. If not, will it ever be? Or should I just get something else?
↧
↧
Another trophy in the Pocket! Win @ CMIYC contest 2015
We're already preparing our full write-up! Once it's dont we will post it here.
There, just as a small note here: We won Crack Me If You Can 2015 @ defcon
http://contest-2015.korelogic.com/stats.html
Congrats to Team CynoSure Prime, they proofed they are a true "pro" team. Of course, congrats to Team InsidePro and Team john-users, too.
Also thanks to KoreLogic for organisation and an amazing contest. We all really loved it this year.
There, just as a small note here: We won Crack Me If You Can 2015 @ defcon
http://contest-2015.korelogic.com/stats.html
Congrats to Team CynoSure Prime, they proofed they are a true "pro" team. Of course, congrats to Team InsidePro and Team john-users, too.
Also thanks to KoreLogic for organisation and an amazing contest. We all really loved it this year.
↧
Can I Use Hashcat to Find Bitcoin Private Key?
I have a bitcoin private key (private address) that I think I may have misscopied a character or two in. Is there a way to use hashcat to try and find the error/errors?
For the sake of example, the private key is 51 characters long, like this:
"5KXp7ShWbGGggjJihAEjkTujQ7tsz3kihBFYNbhxyiPxj7tPNMn"
and I think I may have messed up a character or two, like:
"5KXp7ShWbGGggjfihAEjkTujQ7tsv3kihBFYNbhxyiYxj7tPNMn" (In this example a "J" became an "f"; a "z" a "v" & a "P" a "Y")
So now when I try and import the private key to Bitcoin Core or Armory or Electrum I get a message that says something like: improperly format address.
Is there some way to try and figure this out?
For the sake of example, the private key is 51 characters long, like this:
"5KXp7ShWbGGggjJihAEjkTujQ7tsz3kihBFYNbhxyiPxj7tPNMn"
and I think I may have messed up a character or two, like:
"5KXp7ShWbGGggjfihAEjkTujQ7tsv3kihBFYNbhxyiYxj7tPNMn" (In this example a "J" became an "f"; a "z" a "v" & a "P" a "Y")
So now when I try and import the private key to Bitcoin Core or Armory or Electrum I get a message that says something like: improperly format address.
Is there some way to try and figure this out?
↧
Possible bug with Office 2003 hash - no collision found
Hey guys,
I got a problem with this Office 2003 hash:
<removed by philsmd>
Running hashcat:
./cudaHashcat64.bin -m 9700 ~/hash_to_crack.txt -a 3 ?b?b?b?b?b -w 3 --outfile ~/cracked_hash.txt
It completes 100% but no collisions is found.
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
I'm using cudaHashcat 1.36 and NVIDIA 346.82 driver.
Reading through the forum I found a similar problem with AMD's catalyst driver. Do you think this problem is similar?
Thanks,
--merc
I got a problem with this Office 2003 hash:
<removed by philsmd>
Running hashcat:
./cudaHashcat64.bin -m 9700 ~/hash_to_crack.txt -a 3 ?b?b?b?b?b -w 3 --outfile ~/cracked_hash.txt
It completes 100% but no collisions is found.
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
I'm using cudaHashcat 1.36 and NVIDIA 346.82 driver.
Reading through the forum I found a similar problem with AMD's catalyst driver. Do you think this problem is similar?
Thanks,
--merc
↧
-1 NVAPI_ERROR
when I run cudahashcat64.exe -m10 MD5:SALT. The process starts but after 10 seconds, I start getting WARN: NvAPI_GPU_GetThermalSettings() -1 NVAPI_ERROR.
Hashcat seems to hang from there and I cannot seem to crack the MD5. Anyone has any idea of what is happening or what that error is? I have version 1.36 with the latest driver from NVidia 353.62 GeForce GTX 780M video card.
Any help would be appreciated.
Thank you
NVAPI Error.JPG (Size: 96.86 KB / Downloads: 3)
Hashcat seems to hang from there and I cannot seem to crack the MD5. Anyone has any idea of what is happening or what that error is? I have version 1.36 with the latest driver from NVidia 353.62 GeForce GTX 780M video card.
Any help would be appreciated.
Thank you
NVAPI Error.JPG (Size: 96.86 KB / Downloads: 3)
↧
↧
Beta access? Or OpenCL alternative?
I swear I remember reading that the new Catalyst drivers are compatible with the unreleased beta of oclHashcat, but that beta is not available yet, correct?
Is there an alternative to oclHashcat that works with the latest Catalyst drivers?
Is there an alternative to oclHashcat that works with the latest Catalyst drivers?
↧
How does -q and -r work with maskprocessor?
In Mask Processor How to use -q & -r Function ..Please Anyone tell me with Clear Example //??
↧
Can't reverse known hash ?
Hello,
I recently wanted to try OclHashCat
I downloaded the default Hash from this website (the password is supposed to be hashcat)
$P$984478476IagS59wHZvyQMArzfx58u.
Here is my cmd-line using Brute-force-mask :
Am I doing it right ? As I know the beggining of the password (hash + ?l which should test all possibility after the word hash, so it should take like 25 seconds to find the "cat" remaining, why can't I find it then ?)
Thx
I recently wanted to try OclHashCat
I downloaded the default Hash from this website (the password is supposed to be hashcat)
$P$984478476IagS59wHZvyQMArzfx58u.
Here is my cmd-line using Brute-force-mask :
Quote:cudaHashcat64.exe -a 3 -1 hash?l -m 400 hascc.hash
Am I doing it right ? As I know the beggining of the password (hash + ?l which should test all possibility after the word hash, so it should take like 25 seconds to find the "cat" remaining, why can't I find it then ?)
Thx
↧
peoplesoft hash help
I've read through this forum and haven't found this answer, so hopefully I've missed something.
I see hash type 133 (Peoplesoft). From my understanding on reading the support ticket when it was implemented it assumes no salt.
The hash I'm dealing with is as follows:
sha1 ( salt + convert_to_utf-16le(password) ) )
The salt has characters outside of ascii range. For example, hex bytes 01, 02, 03, etc. I can calculate the salt for each hash. For the example I have the salt is 226 hex characters or 113 bytes.
Any suggestions on what to try?
Any help is appreciated.
I see hash type 133 (Peoplesoft). From my understanding on reading the support ticket when it was implemented it assumes no salt.
The hash I'm dealing with is as follows:
sha1 ( salt + convert_to_utf-16le(password) ) )
The salt has characters outside of ascii range. For example, hex bytes 01, 02, 03, etc. I can calculate the salt for each hash. For the example I have the salt is 226 hex characters or 113 bytes.
Any suggestions on what to try?
Any help is appreciated.
↧
↧
Efficiency with cracking password
Hello guys, I'm cracking a Mac OS 10.8+ salted hash. Using my GPU I'm getting about 2100 H/s.
I used this webpage to get the admin hash code:
http://tuukkamerilainen.com/how-to-crack...-password/
Is there anyway I can improve decrypting it? I'm using a 780ti.
I used this command in CMD:
cudaHashcat64.exe -m 7100 -a3 admin.hash ?u?l?l?l?l?d?d?d
(I'm assuming that it's 8 characters long.)
Reagrds,
blaze756
I used this webpage to get the admin hash code:
http://tuukkamerilainen.com/how-to-crack...-password/
Is there anyway I can improve decrypting it? I'm using a 780ti.
I used this command in CMD:
cudaHashcat64.exe -m 7100 -a3 admin.hash ?u?l?l?l?l?d?d?d
(I'm assuming that it's 8 characters long.)
Reagrds,
blaze756
↧
rules in combination attack
Hi there, thanks for building this great software :-)
I have an old truecrypt container without a password - but I know it shoud be a combination of some of my other passwords concated with "+*-$" or whatever. So I wrote everything I remembered into a file and used a shell script to combine everything with everything to deepth 3 = - ~50 Lines ^ 3 possibilities. I use this same list for left and right in a combination attack = 50^6 possible combinations.
Works fine, I only have one problem - I know my password is rather long (> 16 Chars), but I only can set rules for left and right seperately. I'd like to have a rule to reject all combined passwords <= 16 chars since passwords like *----* are useless to me. Rule file is only supported with -a 0
My current command line looks like this (to sort out at least the obvious crap):
oclHashcat64.exe -m 6211 -a 1 container.tc left.txt right.txt -j ">6" -k ">6"
Any idea to optimize this thing? I fear I have to remember some more passwords and try again (perhaps with depth 4 on both sides) and it would be very usefull to drop the crap instead of trying every possible combination...
I have an old truecrypt container without a password - but I know it shoud be a combination of some of my other passwords concated with "+*-$" or whatever. So I wrote everything I remembered into a file and used a shell script to combine everything with everything to deepth 3 = - ~50 Lines ^ 3 possibilities. I use this same list for left and right in a combination attack = 50^6 possible combinations.
Works fine, I only have one problem - I know my password is rather long (> 16 Chars), but I only can set rules for left and right seperately. I'd like to have a rule to reject all combined passwords <= 16 chars since passwords like *----* are useless to me. Rule file is only supported with -a 0
My current command line looks like this (to sort out at least the obvious crap):
oclHashcat64.exe -m 6211 -a 1 container.tc left.txt right.txt -j ">6" -k ">6"
Any idea to optimize this thing? I fear I have to remember some more passwords and try again (perhaps with depth 4 on both sides) and it would be very usefull to drop the crap instead of trying every possible combination...
↧
How to do a real-brute-force ?
How to do a full brute-force operation ? I think the password is 9 characters-long but I'm not sure so masking is a bit useless for me.
^This does a full lower-case alphabet brute-force from 3 to 12 character lenght, right ?
Code:
cudaHashcat64.exe -a 3 -m 400 -i --increment-min=3 --increment-max=12 hash.txt
^This does a full lower-case alphabet brute-force from 3 to 12 character lenght, right ?
↧
How to increase CPU Hashcat Speed In Table Attack Mode ?
Hello Hashcat,..
I Am Using CPU Hashcat on Table Attack with Dual Core ,4 Gb Ram ..So My question is How to speed it Up..
Do I need i3,i5,i7 ??? If Any Tell ?
Or Any Other Alternate Solution...???Plz Let Me Know..
I Am Using CPU Hashcat on Table Attack with Dual Core ,4 Gb Ram ..So My question is How to speed it Up..
Do I need i3,i5,i7 ??? If Any Tell ?
Or Any Other Alternate Solution...???Plz Let Me Know..
↧
↧
Any workaround to progress saving for mask attack to restore file?
I have lost progress to command prompt freezes and other problems, and I am experimenting with persistent spot instances on EC2 as I have limited access to hardware and space due to my current situation.
From what I can tell, using a mask attack causes restore point saves to be stuck at zero for the entire mask process. An .hcmask file with multiple masks seems to only save progress at each mask's exhaustion.
I also found this which supports the theory somewhat, and the response looks like it will not be addressed:
https://hashcat.net/trac/ticket/603
However I could be misinterpreting things, so if someone could clear up what I have found I would appreciate it.
One workaround I have found is to use MP64 to generate a .dict file of the mask but it has several limitations. The first is file size of the generated dictionaries. While not a huge deal locally, for an ec2 instance with a 25 GB hdd it can be a real problem.
The biggest limitation, however, is lack of support for markov chains. The hash I am working on is a tough nut and is probably using a long password. For longer masks I cannot use the full keyspace. Not only would the file size generated by mp64 of the full key space be unmanageable, but the time to process it with hcat64 be impossible.. MP64 does not support markov chains.
DOes anyone have any input of how I can work around this problem? Is there any way to save progress of large masks when cudahashcaat will be exited and restored often? I have looked though the software options many times and cannot seem to find an answer.
THank you.
From what I can tell, using a mask attack causes restore point saves to be stuck at zero for the entire mask process. An .hcmask file with multiple masks seems to only save progress at each mask's exhaustion.
I also found this which supports the theory somewhat, and the response looks like it will not be addressed:
https://hashcat.net/trac/ticket/603
However I could be misinterpreting things, so if someone could clear up what I have found I would appreciate it.
One workaround I have found is to use MP64 to generate a .dict file of the mask but it has several limitations. The first is file size of the generated dictionaries. While not a huge deal locally, for an ec2 instance with a 25 GB hdd it can be a real problem.
The biggest limitation, however, is lack of support for markov chains. The hash I am working on is a tough nut and is probably using a long password. For longer masks I cannot use the full keyspace. Not only would the file size generated by mp64 of the full key space be unmanageable, but the time to process it with hcat64 be impossible.. MP64 does not support markov chains.
DOes anyone have any input of how I can work around this problem? Is there any way to save progress of large masks when cudahashcaat will be exited and restored often? I have looked though the software options many times and cannot seem to find an answer.
THank you.
↧
Rules in princeprocessor
Hi,
What is the story behind the generated rule files in princeprocessor?
I haven't seen those before and noticed them when I upgraded to .21
Regards Martin G
What is the story behind the generated rule files in princeprocessor?
I haven't seen those before and noticed them when I upgraded to .21
Regards Martin G
↧
truecrypt support for versions < 5?
Found some usefull help when asking for help in the other thread - thanks
Meanwhile I'm afraid that my container was created using an older tc Version - either 4.x (probably) or 3.x (possibly). Any way to use oclHashcat on this, too?
Meanwhile I'm afraid that my container was created using an older tc Version - either 4.x (probably) or 3.x (possibly). Any way to use oclHashcat on this, too?
↧