Download here: http://hashcat.net/oclhashcat/
oclHashcat v1.00 is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15
The reason for fusion was:
- Simplify the project! Users were confused which tool among -lite and -plus they should choose.
- Fusioned oclHashcat will automatically decide which kernel type to choose based on the attack-mode and the hash-type you selected
- Save maintaining two programs with nearly the same codebase
- Save disk-space and packages
This release is alot about performance and bugs
While -plus v0.15 focused on supporting password candidates with length 15+, which in some cases reduced cracking speed, we can say that with oclHashcat v1.00 most of the speed loss that inevitabely was introduced with -plus v0.15 got compensated for many hash types by heavily optimizing the new kernels (e.g. merging -plus kernels with -lite and continuing optimizing the resulting kernel). You will see some nice increase of cracking speed for some hash-types (e.g. raw MD5 on NVidia from ~1600MH/s -> 1800MH/s), see benchmarking section.
We've also written an fully automated testing system, cross-platform. We found some bugs which were all fixed. If you want to try it on your system just come to IRC and we'll instruct you how to run it.
Workaround driver problems
Whenever AMD or NVidia releases new drivers we have to check if our code still works. Most of the time it just works, but sometimes they add bugs to their driver that influences (or heavily influences) oclHashcat.
One example was the Catalyst 13.8beta driver, which is known to have some bugs that influence oclHashcat. We had to mark it as "broken" and were printing out a warning message whenever a user wanted to run -lite or -plus using this driver.
That was a very restrictive way of handling that type of problem and made package maintainers mad. This behavior forced the distribution to stick to a specific driver version. So we decided to find out where the bugs in the drivers are and then try to workaround them.
That done, we worked around all (known) bugs so you will be able to use all drivers from Catalyst 13.4 and upwards.
Built-in benchmarking system
While this feature was in -lite for some time, it's new for -plus users. This "tool" will show you which maximum performance you can get out of your system in an ideal cracking case. Such a case is usually trying to crack a single hash using the brute-force attack mode, because we can make use of a lot of different optimization techniques.
It has been fine-tuned to use near-to-perfect tuned workloads (-n and -u parameters) and it is using a huge keyspace. Whenever you run an attack there are many factors that can influence cracking speed. By using the benchmark system you can get an idea what your maximum possible cracking speed could be and optimize your attack.
Most of the basic commandline parameters can be used in addition, for example you can use -d to select which GPU(s) or card(s) to run in benchmark mode. Or, if you want to benchmark just a single hash type you can use the -m parameter.
There are two different benchmark-modes. The default sets the configuration to run in benchmark-mode 1, which is the more aggressive one. It's what most people will use and thats it. If you switch to benchmark-mode 0 you can manually tune -n and -u value to even more aggressive values but make sure you have good GPU cooling.
It's also a very simple way to benchmark your system and compare it with others. To have some fun after downloading oclHashcat v1.00 just run it with e.g. "./oclHashcat64.bin -b", that's it.
Multi-hccap support
Starting with this release, oclHashcat supports .hccap files for WPA cracking that include several networks (both with different or same ESSID). The file format is basically using the same struct as before, but one .hccap file can now consist of several such structures.
This implies that you could simply merge two or more .hccap files together into a new .hccap file that contains all of the merged information. A simple "cat 1st.hccap 2nd.hccap > all.hccap" should suffice to get you started with this new feature (on windows use an equivalent command).
Support for new algorithms
- HMAC-* (key = $pass)
- HMAC-* (key = $salt)
- sha1(LinkedIn)
- Kerberos 5 AS-REQ Pre-Auth etype 23
* = MD5, SHA1, SHA256, SHA512
Full changelog
Quote:
* initial version 1.00
first public release, oclHashcat is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15
type: driver
file: kernels
desc: added support for AMD Catalyst v13.8b*
type: driver
file: kernels
desc: added support for AMD Catalyst v13.9
type: driver
file: kernels
desc: added support for AMD Catalyst v13.11b*
type: driver
file: kernels
desc: added support for AMD R9 series
type: driver
file: kernels
desc: added support for AMD APP SDK v2.9
type: feature
file: kernels
desc: added -m 50 = HMAC-MD5 (key = $pass)
type: feature
file: kernels
desc: added -m 60 = HMAC-MD5 (key = $salt)
type: feature
file: kernels
desc: added -m 150 = HMAC-SHA1 (key = $pass)
type: feature
file: kernels
desc: added -m 160 = HMAC-SHA1 (key = $salt)
type: feature
file: kernels
desc: added -m 190 = sha1(LinkedIn)
trac: #190
type: feature
file: kernels
desc: added -m 1450 = HMAC-SHA256 (key = $pass)
trac: #97
type: feature
file: kernels
desc: added -m 1460 = HMAC-SHA256 (key = $salt)
trac: #97
type: feature
file: kernels
desc: added -m 1750 = HMAC-SHA512 (key = $pass)
type: feature
file: kernels
desc: added -m 1760 = HMAC-SHA512 (key = $salt)
type: feature
file: kernels
desc: added -m 7500 = Kerberos 5 AS-REQ Pre-Auth etype 23
type: feature
file: host programs
desc: added tab completion feature for bash in extra folder
type: feature
file: host programs
desc: added support for Tesla Deployment Kit v5.319.43
type: feature
file: host programs
desc: added support for NVAPI R319
type: feature
file: host programs
desc: added --benchmark, run several hash modes in benchmark mode for speed tests
type: feature
file: host programs
desc: added --disable-restore option, don't write/update nor touch restore file
type: feature
file: host programs
desc: added --cleanup-rules, remove rules that couldn't be used or have duplicates. A .bak backup file will be created
trac: #139
type: feature
file: host programs
desc: added support for hccap files containing several networks
trac: #167
type: feature
file: host programs
desc: show the status by hitting the s key or the Enter key, show the status when dict or mask changed
trac: #189
type: feature
file: host programs
desc: show line progress for maskfiles (.hcmask)
trac: #206
type: rules
file: T0XlC.rule
desc: cleaned, original T0XlC.rule
cred: T0XlC
type: rules
file: T0XlCv1.rule
desc: added ruleset with 12000 random rules
cred: T0XlC
type: rules
file: T0XlC_insert_00-99_1950-2050_toprules_0_F.rule
desc: added ruleset with insert rules from position 0 to position F (00-99,1950-2050)
cred: T0XlC
type: rules
file: T0XlC_insert_space_and_special_0_F.rule
desc: added ruleset with insert rules from position 0 to position F (special characters)
cred: T0XlC
type: rules
file: T0XlC_insert_top_100_passwords_1_G.rule
desc: added ruleset with insert rules from position 0 to position F (top 100 passwords)
cred: T0XlC
type: bug
file: host programs
desc: problem while performing the --remove operation in windows fixed - timing problem (Permission denied error)
type: bug
file: host programs
desc: Fixed mask length display in status screen when using hash types that internally use unicode
type: bug
file: host programs
desc: Hash files that did not end with a newline character were not parsed correctly
type: bug
file: host programs
desc: Fixed crash when hitting CTRL-C, when receiving abort signals
type: bug
file: host programs
desc: Fixed freeze, flush problem w/ progress at ~100%
trac: #82
type: bug
file: host programs
desc: Fixed russian charset files (hcchr), removed unnecessary chars
trac: #194
type: bug
file: host programs
desc: Fixes a crash when using --username together with --remove
trac: #197
type: change
file: host programs
desc: new default status-timer value is 10 seconds instead of 1 minute