|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 59
Members: 0
Total: 59
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
hashcat |
|
Posted: Thu Dec 24, 2009 10:23 pm |
|
|
K99 |
Regular user |
|
|
Joined: Dec 25, 2009 |
Posts: 11 |
|
|
|
|
|
|
|
* Free
* Multi-Threaded
* Multi-Hash
* Linux & Windows native binaries
* Fastest cpu-based multihash cracker
* SSE2 accelerated
* All Attack-Modes except Brute-Force and Permutation can be extended by Hybrid-Attack rules
* Very fast Hybrid-Attack engine
* Rules mostly compatible with JTR and PasswordsPro
* Possible to resume or limit session
* Automatically recognizes recovered hashes from outfile at startup
* Can automatically generate random rules for Hybrid-Attack
* Load hashlist with more than 3 million hashes of any type at once
* Load saltlist from external file and then use them in a Brute-Force Attack variant
* Able to work in an distributed environment
* Specify multiple wordlists and also multiple directories of wordlists
* Number of threads can be configured
* Threads run on lowest priority
* 33+ Algorithms implemented with performance in mind
* ... and much more
* MD5
* md5($pass.$salt)
* md5($salt.$pass)
* md5(md5($pass))
* md5(md5(md5($pass)))
* md5(md5($pass).$salt)
* md5(md5($salt).$pass)
* md5($salt.md5($pass))
* md5($salt.$pass.$salt)
* md5(md5($salt).md5($pass))
* md5(md5($pass).md5($salt))
* md5($salt.md5($salt.$pass))
* md5($salt.md5($pass.$salt))
* md5($username.0.$pass)
* md5(strtoupper(md5($pass)))
* SHA1
* sha1($pass.$salt)
* sha1($salt.$pass)
* sha1(sha1($pass))
* sha1(sha1(sha1($pass)))
* sha1(strtolower($username).$pass)
* MySQL
* MySQL4.1/MySQL5
* MD5(Wordpress)
* MD5(phpBB3)
* MD5(Unix)
* SHA-1(Base64)
* SSHA-1(Base64)
* SHA-1(Django)
* MD4
* NTLM
* Domain Cached Credentials
* MD5(Chap)
* MSSQL
Attack-Modes
* Straight *
* Combination *
* Toggle-Case *
* Brute-Force
* Permutation
* accept Hybrid-Attack extension
Tested OS
* Windows XP 32bit
* Windows XP 64bit
* Windows Vista 64bit
* Windows 7 64bit
* Debian Lenny 32bit
* Ubuntu 9.02 64bit
* Ubuntu 9.10 64bit
Check the speed at the website or take a look t this chart:
http://hashcat.net/hashcat/
irc://irc.rizon.net/hashcat |
|
Last edited by K99 on Sat May 01, 2010 9:16 pm; edited 1 time in total |
|
|
|
|
|
|
|
Posted: Mon Jan 04, 2010 7:42 pm |
|
|
K99 |
Regular user |
|
|
Joined: Dec 25, 2009 |
Posts: 11 |
|
|
|
|
|
|
|
|
|
|
|
Posted: Mon Jan 04, 2010 10:55 pm |
|
|
vince213333 |
Advanced user |
|
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
|
|
|
|
Thanks
I surely recommend this program to anyone with a processor with multiple cores, it does go a lot faster than passwordspro for example. |
|
|
|
|
Posted: Tue Feb 23, 2010 3:11 pm |
|
|
K99 |
Regular user |
|
|
Joined: Dec 25, 2009 |
Posts: 11 |
|
|
|
|
|
|
|
|
|
|
|
Posted: Tue Feb 23, 2010 6:04 pm |
|
|
vince213333 |
Advanced user |
|
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
|
|
|
|
Thanks for the update |
|
|
|
|
Posted: Tue Mar 16, 2010 10:17 pm |
|
|
BoboTiG |
Advanced user |
|
|
Joined: Jun 22, 2009 |
Posts: 66 |
|
|
|
|
|
|
|
Hey, seems nice !
I will give you returns after tests. Good continuation |
|
|
|
|
Posted: Wed Mar 17, 2010 4:57 am |
|
|
capt |
Advanced user |
|
|
Joined: Nov 04, 2008 |
Posts: 232 |
|
|
|
|
|
|
|
Yea vince introduced this to me and its a great tool. Great speed and results for me ^^ |
|
|
|
|
Posted: Wed Mar 17, 2010 12:43 pm |
|
|
vince213333 |
Advanced user |
|
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
|
|
|
|
Been using it ever since i first saw it Glad you like it |
|
|
|
|
Posted: Sat May 01, 2010 9:17 pm |
|
|
K99 |
Regular user |
|
|
Joined: Dec 25, 2009 |
Posts: 11 |
|
|
|
|
|
|
|
Update: The new version is even faster. More algorithms added and some bugs got fixed. Check out the new site: http://hashcat.net/hashcat/ |
|
|
|
|
Posted: Sat May 01, 2010 9:46 pm |
|
|
capt |
Advanced user |
|
|
Joined: Nov 04, 2008 |
Posts: 232 |
|
|
|
|
|
|
|
very nice man <3in the hybrid attack. |
|
|
|
|
|
|
|
|
Posted: Thu Jan 20, 2011 7:57 pm |
|
|
K99 |
Regular user |
|
|
Joined: Dec 25, 2009 |
Posts: 11 |
|
|
|
|
|
|
|
The last version of hashcat is hashcat v0.35
performance v0.34 -> v0.35
Quote: | MD4 based (NTLM, DCC, ...):
1 hash: v0.34 = 9.64M/s, v0.35 = 11.06M/s = + 12.8%
2 hash: v0.34 = 6.70M/s, v0.35 = 6.84M/s = + 2.0%
MD5 based (MD5, md5crypt, phpass, ...):
1 hash: v0.34 = 7.27M/s, v0.35 = 9.05M/s = + 19.6%
2 hash: v0.34 = 5.43M/s, v0.35 = 6.04M/s = + 10.0%
SHA1 based (SHA1, MYSQL4, ...):
1 hash: v0.34 = 4.99M/s, v0.35 = 5.25M/s = + 5.0%
2 hash: v0.34 = 4.06M/s, v0.35 = 4.09M/s = + 0.8% |
It supports the following algorithms:
* MD5
* md5($pass.$salt)
* md5($salt.$pass)
* md5(md5($pass))
* md5(md5(md5($pass)))
* md5(md5($pass).$salt)
* md5(md5($salt).$pass)
* md5($salt.md5($pass))
* md5($salt.$pass.$salt)
* md5(md5($salt).md5($pass))
* md5(md5($pass).md5($salt))
* md5($salt.md5($salt.$pass))
* md5($salt.md5($pass.$salt))
* md5($username.0.$pass)
* md5(strtoupper(md5($pass)))
* SHA1
* sha1($pass.$salt)
* sha1($salt.$pass)
* sha1(sha1($pass))
* sha1(sha1(sha1($pass)))
* sha1(strtolower($username).$pass)
* MySQL
* MySQL4.1/MySQL5
* MD5(Wordpress)
* MD5(phpBB3)
* MD5(Unix)
* SHA-1(Base64)
* SSHA-1(Base64)
* SHA-1(Django)
* MD4
* NTLM
* Domain Cached Credentials
* MD5(Chap)
* MSSQL
* SHA-256
You can get it here:
http://hashcat.net/hashcat/ |
|
|
|
|
|
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|