Quantcast
Channel: hashcat Forum - All Forums
Viewing all 7673 articles
Browse latest View live

DCC1, DCC2?

$
0
0
Good day to all of you,

I have (during a pentest) managed to get some dumps out of the firewall, but to my amazement, I had never seen hashes like this. 

Do you think these are realistic hashes :

first one seems normal, such as a DCC hash: (changed a few letters for sec)

PBzXaJrO7QnfB4XjNmVp8uXyJVjjG8IT

but the second one of a different user:

NrHoFGjPO%2BYpWGhvWJNKZNhPkdYtVf3O (notice the %)

Do you have any idea of what that could be?

Thank you

creating wordlist or not, what attack to use?

$
0
0
Dear members,

I hope you can help me. I start to study more hashcat and hacking. The reason is personal security and i started to like cryptography (to protect my data 2).
I manage to make extremly good wordlist for my speaking area (my country). It have all names, surnames, nicknames, then date of birth, months, and all words (cases of words, nouns...)
Dictionary1 with all words have 266,034
Dictionary2 with all names, surnames and nicknames have 11,553
Dictionary3 with all months years have 740 words and,
Dictionary4 that is calendar (exp: 11031989) from 1950 to 2020 years have 46,896 words

I created python scrip to do all combination and scrypt to merge 2 dictionary with all combinations.
But if  I do all mutations of words (a=@...) and merge them all into one, then do combination with that single dictionary, the file will be huge. I'm sure that dict would be able to hack so many regular passwords. I think mutation is week since i don't have "c=(" or some others. But i can try to correct that.

So what would be best solution? Maybe I'm not aware of something.

I see there is toogle case attack, table lookup attack, combinator attack and rule based attack.
Does rule based attack cover all attacks (toogle case, table lookup and combinator)?
Or is it better (if it can be done) to merge all my dictionary (without mutation or combination) into one dictionary5 (266,034+11,553+740+46,896=325,223 words) then do table lookup attack to get dictionary 6. Then merge dictionary 5 and dictionary 6 = dictionary 7. Do toogle case attack with dictionary 7 to get dictionary 8. Then merge dict7 and dict8 = dict 9. And with that dict 9 to do combinator attack to get dict 10. Merge dict 9 and dict 10 to get final wordlist. Now that list (I think) is gona be huge huge huge file. But if i use it with rule bassed attack it can do pretty good unlock.
Now you sea what is my confusion. Should i do this or rule based attack cover all this? Is there better solution?

P.S. One more question. Can hashcat do attack and save words? For example to get mu dictionary 5 and with table lookup just to create dictionary.

Help for a noob

$
0
0
Hi, i'm a noob of this program.
I need help cracking an hash.

I know:
- plaintext
- hash of the plaintext (it seems an md5)

I need to know what algorithm it's used to generate that hash (if they use salt etc...). 
It is possible to do that using hashcat?

I know it's not a simple task, because there are infinite possible combination of algoritms that can be used to generate an hash.
However, i'd like to give it a try and do at least these attacks (that are supported by hashcat):
  • md5($pass.$salt)
  • md5($salt.$pass)
  • md5(unicode($pass).$salt)
  • md5($salt.unicode($pass))
  • md5(sha1($pass))
  • md5($salt.md5($pass))
  • md5($salt.$pass.$salt)
  • md5(strtoupper(md5($pass)))
What commandline parameters can I use to do these attacks?

[Excel 2003] Read-only password : need second hash ?

$
0
0
Hello,

Just succeed in colliding a excel 2003 password with -m 9710 then -m 9720. (oldoffice$0)

This gave me a working password to open the document.
To modify it, Excel ask me another password (the first one does not work).

For this second password, I guess we need a second hash, how to extract it ?

Single CPU vs Dual CPU & Hashcat

$
0
0
Will Hashcat run faster on a dual 2.66 Ghz CPU machine or a single 3.06 Ghz CPU machine? I'm trying to get an idea of whether a dual CPU is worth the expense for running Hashcat. Thanks.

hashcat mask attack output file location

$
0
0
where to find password after hashcat mask attack completed ?

this is my command

hashcat -m 2500 -a 3  OURFILEHF7.hccap  ?d?d?d?d?d?d?d?u --pw-min=8 --pw-max=8



tell me if there is something wrong with it .

hashcat mask attack very slow

$
0
0
the hashcat mask attack is taking too lone it will finish after 1 day 16 hours i am hacking wifi in a students competition is there any way to make it faster so i win the competition .

this is my command :

hashcat -m 2500 -a 3  OURFILEHF7.hccap  ?d?d?d?d?d?d?d?u --pw-min=8 --pw-max=8

LM to NTLM Converting

$
0
0
So with our new rig I did some testing and oclHashcat beat ophcrack/rcracki_mt/john for cracking LM hashes (was surprised about the rainbow tables times being higher).

The problem is oclHashcast only returns the LM version of the password, not the proper case version.  Now with JtR I could do something like the following:
Code:
$ john --format=LM hashes.pwdump
$ john --show --format=LM hashes.pwdump > LM.wordlist
$ john --format=NT --rule=NT --wordlist=LM.wordlist hashes.pwdump
$ john --show --format=NT hashes.pwdump

Not the most elegant but it does work.

Is there something similar that could be done with oclHashcat?

Question about oclHashcat CUDA on OS X

$
0
0
So I know that oclHashcat isn't on OS X because of issues with OpenCL (at least I think that was it).

What I'm wondering is why the CUDA version isn't, according to the wiki the nvcc compiler can cross compile the kernels so it sounds possible. (Well if you have an nVidia card)

removed 1 hash found in potfile

$
0
0
Hi,

i have a batch file which will run oclhashcat twice. Once with a brute force mask, and the second time with a wordlist.

i have already stored 2 resolved hashes in the pot file, but in both, runs only one is found and removed, but im still using the same hccap file, where the hashes that were resolved in the pot file are stored.

Why can oclhashcat only find and remove one hash found in the pot file, and not both?

Best Affordable GPU for oclhashcat Q4'15 ???

$
0
0
Hello.

I would like to ask you which is the best affordable GPU for using it with the oclhashcat. Also what is the difference between buying an OEM card (MSI R9 290x) and a retail one (Club 3D R9 290x)?

Sorry if i'm asking questions for newbies. I am using the oclhashcat for hobby password cracking with a GT 430 and it seems to be decent for cracking small numeric sha512 passwords but i would like something better.

Thank you.

CudaHashcat64 wifi hccap

$
0
0
Hello there Smile

Im a new user on hashcat.
All new for me Smile

I have some question for begin Smile

I have succesfull find password on #1

But i have another to find.

My question was simple.

I wanna using all of my cpu I5 intel with nvidia video card.
I have 10 gig ram too.
Windows 10 x64

I need something faster .. im waiting ffor 4 day 5 hours to scan ..

CudaHashcat64 -m 2500 handshake1.hccap biglist.lst


-how i can using all cpu to scan faster Smile
Or change my commande to be more fast Smile


Thanks

Hardware Input

$
0
0
Hi All,

I was looking to put together a crypto-cracking box. Trying to keep costs relative (not my money but still). After looking at posts I opt'd for 4 980ti's.

I was hoping to see if there are any mistakes or areas of improvement in my choices and if anyone sees red flags before I go out and purchase this. 

Your expertise is greatly appreciated

Link:
http://ca.pcpartpicker.com/p/wbrYD3

low speed with cudaHashcat64

$
0
0
Hey guys,

I'm running cudaHashcat on windows 10 with GT 720M GPU. So i ran a benchmark test and find out it's so slow.
Code:
D:\cudaHashcat-1.36>cudaHashcat64.exe -m 2500 -b
cudaHashcat v1.36 starting in benchmark-mode...

Device #1: GeForce GT 720M, 2048MB, [b]758Mhz[/b], 1MCU

Hashtype: WPA/WPA2
Workload: 1024 loops, 32 accel

Speed.GPU.#1.:     [b]6871 H/s[/b]

Started: Fri Sep 18 22:23:49 2015
Stopped: Fri Sep 18 22:24:06 2015


Is something wrong or it's just because of my GPU??

Nvidia Error cracking RAR hash

$
0
0
I've been getting an error when trying to crack a RAR hash in cudaHashcat64.

Once the crack runs for about 10 minutes, it dumps me out with a "ERROR cuSteamSynchronize () 700"

I hit the status right before the last crash, output is below:

Session.Name...: cudaHashcat
Status.........: Running
Rules.Type.....: File (rules/best64.rule)
Input.Mode.....: File (10-million-combos.txt)
Hash.Target....: *REDACTED*
Hash.Type......: RAR3-hp
Time.Started...: Fri Sep 18 17:00:37 2015 (9 mins, 5 secs)
Time.Estimated.: Fri Sep 18 18:19:39 2015 (1 hour, 9 mins)
Speed.GPU.#1...:        0 H/s
Speed.GPU.#2...:        0 H/s
Speed.GPU.#3...:        0 H/s
Speed.GPU.#4...:    10226 H/s
Speed.GPU.#5...:     9714 H/s
Speed.GPU.#6...:        0 H/s
Speed.GPU.#7...:     9922 H/s
Speed.GPU.#8...:     9910 H/s
Speed.GPU.#*...:    39772 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 39775569/341369259 (11.65%)
Rejected.......: 60753/39775569 (0.15%)
Restore.Point..: 0/4433367 (0.00%)
HWMon.GPU.#1...: 99% Util, 79c Temp, 45% Fan
HWMon.GPU.#2...: 100% Util, 73c Temp, 42% Fan
HWMon.GPU.#3...: 99% Util, 68c Temp, 39% Fan
HWMon.GPU.#4...: 100% Util, 77c Temp, 43% Fan
HWMon.GPU.#5...: 100% Util, 73c Temp, 42% Fan
HWMon.GPU.#6...: 99% Util, 80c Temp, 45% Fan
HWMon.GPU.#7...: 99% Util, 75c Temp, 42% Fan
HWMon.GPU.#8...: 99% Util, 79c Temp, 44% Fan

[s]tatus [p]ause [r]esume [b]ypass [q]uit =>

ERROR: cuStreamSynchronize() 700

My system is a Tyan B7059F77AV6R-2T-N, 8 NVidia 980s, 32GB RAM, Dual Xeon processors.  I'm running cudaHashcat-1.37, with NVidia driver 352.41.

Any ideas on how I can correct this error?

When is all the Truecrypt encryption ciphers available?

$
0
0
Hey

Does someone know when the rest of the Truecrypt encryption ciphers will be finished, or if they are in progress?

I'm talking about these:
XTS Serpent              --- unfinished
XTS Twofish              --- unfinished
XTS AES-Twofish          --- unfinished
XTS AES-Twofish-Serpent  --- unfinished
XTS Serpent-AES          --- unfinished
XTS Serpent-Twofish-AES  --- unfinished
XTS Twofish-Serpent      --- unfinished


Thanks

Hashcat in Prague

Linux vs Windows - nVidia Maxwell

$
0
0
Has anyone tested lately, if there's a difference between running oclHashcat on Linux vs Windows? Any benchmarks (latest drivers etc.)?

RIP Radeon HD 5970

$
0
0
Picked her up on eBay for £55 back in April purely to play around with hashcat as a hobby interest. I had great fun cracking WPAs, DCCs, NTLMs and even played around with the Ashley Madison leaks but this morning she would only say "No Signal Detected".

I PayPal'd someone with "SL3" in his email address domain and she came in a Bitcoin mining mobo box (ASRock H81 Pro BTC) so I knew she'd had a hard life and we would probably only have a short time together.

So here's to our five months together. My electricity bill won't miss you though...

And thank you, atom, for a great piece of engineering!

Help for a rule or command

$
0
0
Final goal: brute-forcing an md5 or sha1 hash in the following format
"wordlistA, wordlistA, worldlistB,"

Essentially, I have two wordlists that I want to try every combination of using them in all three slots as shown above. 
Example: A1, A1, B1.......A1, A1, B2........until A1, A2, B1 and so on

Is this 1) possible to accomplish with hashcat? and 2) if so how?

Thanks a million in advance for any response to this!
Viewing all 7673 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>