Cisco
Looking for the proper syntax to for use with Cisco enable and user secret 5. looks like the hash will be SHA256. running linux I've tried a couple of options but not quite sure what will work best.
View Articlewiki example hashes question
Hello. This is my first post here, but please know that I have been reading extensively, going through google and this forum and the page's wiki and feel I do have an unanswered question (though the...
View Article290 vs 7970?
What's the performance different between 290 and 7970? Price of 290 is 30% more than 7970.
View ArticleSMF
Hi, I'm looking to crack an SMF password. I have the hash, which I believe SMF uses SHA-1 + salt. I have the username of the user which I think is also the salt. How would I go about cracking it? The...
View ArticleWords Combinator
I know how huge the load would become with 3 word being shuffled around but with smaller and more targeted wordlist it would become feasible. but I had this idea where the brute force mode could use a...
View ArticleWPA : print the BSSID as well ?
Hi, Let's assume I have 10 hccap. I "cat" them into all.hccap and try to run it into oclhashcat. What if oclhashcat crack 2 of them which have the same ESSID name ? I won't know which one is the one I...
View Articleedit file ".restore"
Good afternoon. How I can edit the file ".restore"? this is a binary file? Best regards
View ArticleCracking salted md5
Hello there, I'm trying to crack a salted md5 password, but I haven't been able to figure it out from the wiki or the command-line help. I wanted to ask you for some help on how to get started. Btw,...
View Article--username not working- line length exception
Example line: hey@hey.com:$1$xxxxxxxx$xxxxxxxxxxxxxxxxxxxxxx oclhashcat32.exe -a 0 -m 500 --username hash.txt pass.txt Keeps bringing up line length exception another thing is when I crack just the...
View ArticleIncreasing MD5 GPU Utilization?
Hi Was hoping for some pointers with this amazing bit of software. Running Windows 7 64 Bit ,Catalyst 14.4, oclHashcat-1.20 2x7970 GPUs Benchmark for MD5 below; Hashtype: MD5 Workload: 1024 loops, 256...
View Article2 out of 4 cards detected
Hello there! I have 4 cards in the machine, but only 2 are detected by oclHashcat 1.20 (Drivers are ATI 14.4) Output of "aticonfig --list-adapters" is Quote:* 0. 01:00.0 AMD Radeon HD 7900 Series 1....
View ArticleTrouble running oclHashcat-1.01 in Ubuntu 13.04 - Need Help
Hello All, I am new at cracking. I know hashcat is the best cracker. I am using Ubuntu 13.04. And my system info is Code: description: CPU product: Intel(R) Core(TM) i5-4200U CPU @ 1.60GHz...
View Article0% Progress
Hi, I'm new here, you can probably tell by my post count haha I'm not one to usually ask for help, I like to use trial and error and figure things out for myself. I'm seriously stuck though ... lol...
View ArticleFor best results
Ok, so I'm making a new topic because this does not relate to my previous topic. - Sorry if I should have continued using my old topic. How would I get the best results? The bigger my word list, the...
View ArticleoclHashCat vs WPA @ 9700 H/s
I have an older system (dual-core Nvidia 250 GTS) and a newer system (quad-core Nvidia 650 GTX) and they are both scoring about the same in oclHashCat against WPA dictionary attack (approx. 9700 H/s)....
View ArticleAMD MB recommendations for HD6870 and maybe a 290
Hi there. I'm currently using this motherboard and with a HD6870 and AMD Phenom II X2 545 CPU for cracking. The lack of another PCIE16 slot is stopping me from adding another display card, maybe I'll...
View Articlepossible to spread load between CPU+GPU ?
During a WPA bruteforce job, the CPU stays 98% idle for me. I wondered if it was possible to put that to "good use" as well? Thanks, -tk
View Articlerestore session always crashes..
after a power failure (linux ext4), when the machine comes back up, I issue the ./oclHashCat64.bin --session=blah --restore and it consistantly, every time, does this: oclHashcat v1.20 starting in...
View ArticleHelp splitting brute-force attack
Hi there. I've read some topics and wiki references but I don't seem to be able to get this right. Let's assume I'm trying to crack an MD5 hash and it's password is comprised of 8 characters, for ex:...
View Articleopenssl & gost
Hi i have two questions 1. have the opportunity to brute OpenSSL pkcs and pem format private key with passwd? 2. how to should be the format for the hash "GOST R 34.11-94" to brute them?
View Article