Waraxe IT Security Portal
Login or Register
September 8, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 85
Members: 0
Total: 85
Full disclosure
[SYSS-2024-030]: C-MOR Video Surveillance - OS Command Injection (CWE-78)
[SYSS-2024-029]: C-MOR Video Surveillance - Dependency on Vulnerable Third-Party Component (CWE-1395)
[SYSS-2024-028]: C-MOR Video Surveillance - Cleartext Storage of Sensitive Information (CWE-312)
[SYSS-2024-027]: C-MOR Video Surveillance - Improper Privilege Management (CWE-269)
[SYSS-2024-026]: C-MOR Video Surveillance - Unrestricted Upload of File with Dangerous Type (CWE-434)
[SYSS-2024-025]: C-MOR Video Surveillance - Relative Path Traversal (CWE-23)
Backdoor.Win32.Symmi.qua / Remote Stack Buffer Overflow (SEH)
HackTool.Win32.Freezer.br (WinSpy) / Insecure CredentialStorage
Backdoor.Win32.Optix.02.b / Weak Hardcoded Credentials
Backdoor.Win32.JustJoke.2 1 (BackDoor Pro) / Unauthenticated Remote Command Execution
Backdoor.Win32.PoisonIvy. ymw / Insecure Credential Storage
[SYSS-2024-024]: C-MOR Video Surveillance - Improper Access Control (CWE-284)
[SYSS-2024-023]: C-MOR Video Surveillance - SQL Injection(CWE-89)
[SYSS-2024-022]: C-MOR Video Surveillance - Cross-Site Request Forgery (CWE-352)
[SYSS-2024-021]: C-MOR Video Surveillance - Persistent Cross-Site Scripting (CWE-79)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Hash related information -> EGB v1.3 Goto page Previous1, 2, 3Next
Post new topicReply to topic View previous topic :: View next topic
PostPosted: Tue May 12, 2009 1:27 am Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.5.

In the new version:
- Added mask attack. To enable it, in the INI file create (or uncomment) the "Mask" parameter that contains a mask; for example: pass?d?d?d?d?d?d, ?u?u?u?l?l?l2009, etc. The application supports up to 15 custom character sets (in the INI file parameters "CustomCharacterSet1"..."CustomCharacterSetF"), where you can define custom character sets or combinations of standard character sets - for example, "CustomCharacterSet1=?l?u?d", "CustomCharacterSet9=abcdefABCDEF?d", which are engaged in the "Mask" parameter as ?1 and ?9 respectively (Note: Mask in EGB is formed practically the same way as in PasswordsPro). The speed of mask attack for all modules is the same as the speed of brute force attack!
- Added new module, "MD5_Unicode.exe", for recovering Unicode passwords to MD5 hashes. Its average operation speed on GF8800GS is 240М p/s.
- Added new parameter to INI file - AttackTime, which allows limiting attack time (in minutes) and thus improves the flexibility of the application when it is launched from a BAT-file with different INI files (for example, with different character sets for the attack).
- Up to 512 - increased the maximum value of the StreamProcessors parameter.

Download the new version: http://www.insidepro.com/download/egb.zip
View user's profile Send private message
PostPosted: Wed Jun 10, 2009 6:37 pm Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.5.1.

In the new version:
- Added auto-saving current password in INI file during attack every 5 minutes.
- All application modules recompiled to the latest edition of CUDA - v2.2.
- Added new module - md5($username.0.$pass). Search speed per hash on GF8800GS is 155M p/s.
- Increased maximum password length in the modules MD5.exe (to 55 characters) and MD5_Unicode.exe (to 27 characters).
View user's profile Send private message
PostPosted: Sat Dec 12, 2009 3:16 pm Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.6.

In the new version:
- Added support for MultiGPU, i.e. simultaneous use of all GPU cores for attack (maximum number of GPU - 16).
- Added new hashing module: LM.exe.
- Maximum number of salted hashes per attack increased to 512, etc.
More >>
View user's profile Send private message
PostPosted: Sun Feb 07, 2010 6:11 pm Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.6.1.

In the new version:
- Added new module MD5(Unix).exe.
The attack speed per hash in this module makes (on GeForce 8800GS) about 85k p/s.
- Added displaying information on the duration of attack.
- Added new parameters to INI files.
More >>
View user's profile Send private message
PostPosted: Tue Feb 16, 2010 10:33 am Reply with quote
dhukkaman
Beginner
Beginner
Joined: Feb 15, 2010
Posts: 3




Sorry to be a total noob but how do I get the hashes I want to crack to be run with the program? I have been searching for ages to find how this is done but haven't got anywhere.

Please could you explain it simply for us learners out here.
View user's profile Send private message
PostPosted: Tue Feb 16, 2010 2:55 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




dhukkaman wrote:
Sorry to be a total noob but how do I get the hashes I want to crack to be run with the program? I have been searching for ages to find how this is done but haven't got anywhere.

Please could you explain it simply for us learners out here.


Those hashes are usually stored in sql database and of course they are protected from malicious persons. But there are scenarios as:

1. sql injection vulnerabilities - attacker can manipulate database so that hash retrieval is possible (lazy software developers and website admins)
2. phpmyadmin interface can unprotected and accessible from web (lazy admins)
3. sql database backup file can be accessible from web (lazy admins ...)
4. LFI/RFI/Remote File Disclosure and other vulnerabilities can finally lead to the hash retrieval from database
5. open TCP port 3306 with weakly configured mysql daemon and weak username/password (such as root user with empty password)
6. googledork:

http://www.google.ee/#hl=et&q=filetype%3Asql+phpmyadmin+dump+members+converge&lr=&aq=&oq=&fp=9a016538702b090f

More good information:

http://www.hackersforcharity.org/ghdb/
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Tue Feb 16, 2010 6:37 pm Reply with quote
dhukkaman
Beginner
Beginner
Joined: Feb 15, 2010
Posts: 3




waraxe wrote:
dhukkaman wrote:
Sorry to be a total noob but how do I get the hashes I want to crack to be run with the program? I have been searching for ages to find how this is done but haven't got anywhere.

Please could you explain it simply for us learners out here.


Those hashes are usually stored in sql database and of course they are protected from malicious persons. But there are scenarios as:

1. sql injection vulnerabilities - attacker can manipulate database so that hash retrieval is possible (lazy software developers and website admins)
2. phpmyadmin interface can unprotected and accessible from web (lazy admins)
3. sql database backup file can be accessible from web (lazy admins ...)
4. LFI/RFI/Remote File Disclosure and other vulnerabilities can finally lead to the hash retrieval from database
5. open TCP port 3306 with weakly configured mysql daemon and weak username/password (such as root user with empty password)
6. googledork:

http://www.google.ee/#hl=et&q=filetype%3Asql+phpmyadmin+dump+members+converge&lr=&aq=&oq=&fp=9a016538702b090f

More good information:

http://www.hackersforcharity.org/ghdb/


Thank you for the reply and the information.

Yes, the hashes are from my mysql database but my question was rather what do I do with them with extreme gpu bruteforcer?
View user's profile Send private message
PostPosted: Sat Oct 09, 2010 5:01 pm Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.7
In the new version, we have added dictionary attack and many other new features.
More >>>
View user's profile Send private message
PostPosted: Tue Oct 12, 2010 9:21 am Reply with quote
Turbo_boy
Regular user
Regular user
Joined: May 16, 2009
Posts: 7
Location: Netherlands




I want ATI support!
View user's profile Send private message
PostPosted: Tue Oct 19, 2010 6:03 pm Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Added hashing modules MD5(phpBB3).exe and MD5(Wordpress).exe; i.e. now you can run very fast dictionary attacks on hashes with signatures $H$7, $H$9 and $P$B.

For example, on NVIDIA GTS250 my attack speed on hashes of these types is almost 90 times higher than in PasswordsPro.
More >>>
View user's profile Send private message
PostPosted: Sat Jan 15, 2011 7:01 pm Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.8 >>>
View user's profile Send private message
PostPosted: Fri Feb 04, 2011 5:05 am Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.8.1 >>>
View user's profile Send private message
PostPosted: Thu Jun 09, 2011 5:23 pm Reply with quote
InsidePro
Active user
Active user
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.9.

In the new version:
- The number of salted hashes for attack is now literally unlimited and may reach 5000000.
- More >>>
View user's profile Send private message
PostPosted: Sun Jun 26, 2011 9:44 am Reply with quote
pktun420
Advanced user
Advanced user
Joined: Jun 08, 2010
Posts: 93




Gr8 Work i like it Smile !!!
View user's profile Send private message Send e-mail
PostPosted: Mon Jun 27, 2011 12:17 pm Reply with quote
pktun420
Advanced user
Advanced user
Joined: Jun 08, 2010
Posts: 93




is it possible that we can start password length from 1-10 then 10 to 11 on EGB for cracking hashes so we can use multiple machines for cracking hashes. i dont know much about cracking hashes. but this is just suggestion to crack hashes on multiple machines.

sorry for my english i hope you get my point.
View user's profile Send private message Send e-mail
EGB v1.3
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 2 of 3
Goto page Previous1, 2, 3Next
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.182 Seconds