Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

oclHashcat-plus cracks TrueCrypt

$
0
0
Hey Guys,

I've some good news! I've justed finished a working oclHashcat-plus version to support cracking TrueCrypt Smile

Everything is written 100% on GPU.

There is no copy overhead to the host, thus your CPU will stay cool at 0% and you can do whatever you want to do with it.

Current implementation is able to crack all the supported hashes:
  • RipeMD160
  • SHA512
  • Whirlpool

So far for the hashes (and thats what makes cracking TrueCrypt slow).

For the ciphers, I'm currently doing only AES and of course the XTS block-cipher.

Serpent and Twofish and there cascaded modes will be added next.

Quote:
root@sf:~/oclHashcat# ./oclHashcat-plus64.bin -m 6211 test.tc -a 3 ?l?l?l?l?lat -n 32 -u 2000
oclHashcat-plus v0.15 by atom starting...

Hashes: 1 total, 1 unique salts, 1 unique digests
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Workload: 1999 loops, 32 accel
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cayman, 1024MB, 830Mhz, 24MCU
Device #2: Cayman, 1024MB, 830Mhz, 24MCU
Device #3: Cayman, 1024MB, 830Mhz, 24MCU
Device #4: Cayman, 1024MB, 830Mhz, 24MCU
Device #1: Kernel ./kernels/4098/m6211.Cayman_1124.2_1124.2.kernel (480220 bytes)
Device #1: Kernel ./kernels/4098/markov_le_plus.Cayman_1124.2_1124.2.kernel (145332 bytes)
Device #2: Kernel ./kernels/4098/m6211.Cayman_1124.2_1124.2.kernel (480220 bytes)
Device #2: Kernel ./kernels/4098/markov_le_plus.Cayman_1124.2_1124.2.kernel (145332 bytes)
Device #3: Kernel ./kernels/4098/m6211.Cayman_1124.2_1124.2.kernel (480220 bytes)
Device #3: Kernel ./kernels/4098/markov_le_plus.Cayman_1124.2_1124.2.kernel (145332 bytes)
Device #4: Kernel ./kernels/4098/m6211.Cayman_1124.2_1124.2.kernel (480220 bytes)
Device #4: Kernel ./kernels/4098/markov_le_plus.Cayman_1124.2_1124.2.kernel (145332 bytes)

test.tc:hashcat

Session.Name...: oclHashcat-plus
Status.........: Cracked
Input.Mode.....: Mask (?l?l?l?l?lat)
Hash.Target....: File (test.tc)
Hash.Type......: TrueCrypt 5.0+ / PBKDF2-HMAC-RipeMD160 / AES
Time.Started...: Fri May 17 14:27:40 2013 (40 secs)
Speed.GPU.#1...: 55788 H/s
Speed.GPU.#2...: 55775 H/s
Speed.GPU.#3...: 55795 H/s
Speed.GPU.#4...: 55797 H/s
Speed.GPU.#*...: 223.2 kH/s
Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.......: 8749056/11881376 (73.64%)
Rejected.......: 0/8749056 (0.00%)
HWMon.GPU.#1...: 99% Util, 55c Temp, 29% Fan
HWMon.GPU.#2...: 99% Util, 57c Temp, N/A Fan
HWMon.GPU.#3...: 99% Util, 55c Temp, 29% Fan
HWMon.GPU.#4...: 99% Util, 57c Temp, N/A Fan

Started: Fri May 17 14:27:40 2013
Stopped: Fri May 17 14:28:23 2013

Here are some speeds from 2x hd6990:
  • PBKDF2-HMAC-RipeMD160 / AES: 223 kHash/s
  • PBKDF2-HMAC-SHA512 / AES: 95 kHash/s
  • PBKDF2-HMAC-Whirlpool / AES: 49 kHash/s *updated*
  • PBKDF2-HMAC-RipeMD160 boot-mode / AES: 451 kHash/s

These tests show oclHashcat-plus is new worlds fastest TrueCrypt cracker Smile

While I was implementing the Whirlpool hash I found out how this hash can be optimized by over 50% in raw mode. However, some of these technique can also be used within an PBKDF2-HMAC construct.

PS: I'll explain the technique at my talk on passwordscon 2013 in Las Vegas.

Stay tuned for v0.15 release Smile

--
atom

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>