Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 28, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 550
Members: 0
Total: 550
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Hash related information -> EGB v1.3 Goto page Previous  1, 2, 3  Next
Post new topic  Reply to topic View previous topic :: View next topic 
PostPosted: Tue May 12, 2009 1:27 am Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.5.

In the new version:
- Added mask attack. To enable it, in the INI file create (or uncomment) the "Mask" parameter that contains a mask; for example: pass?d?d?d?d?d?d, ?u?u?u?l?l?l2009, etc. The application supports up to 15 custom character sets (in the INI file parameters "CustomCharacterSet1"..."CustomCharacterSetF"), where you can define custom character sets or combinations of standard character sets - for example, "CustomCharacterSet1=?l?u?d", "CustomCharacterSet9=abcdefABCDEF?d", which are engaged in the "Mask" parameter as ?1 and ?9 respectively (Note: Mask in EGB is formed practically the same way as in PasswordsPro). The speed of mask attack for all modules is the same as the speed of brute force attack!
- Added new module, "MD5_Unicode.exe", for recovering Unicode passwords to MD5 hashes. Its average operation speed on GF8800GS is 240М p/s.
- Added new parameter to INI file - AttackTime, which allows limiting attack time (in minutes) and thus improves the flexibility of the application when it is launched from a BAT-file with different INI files (for example, with different character sets for the attack).
- Up to 512 - increased the maximum value of the StreamProcessors parameter.

Download the new version: http://www.insidepro.com/download/egb.zip
View user's profile Send private message
PostPosted: Wed Jun 10, 2009 6:37 pm Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.5.1.

In the new version:
- Added auto-saving current password in INI file during attack every 5 minutes.
- All application modules recompiled to the latest edition of CUDA - v2.2.
- Added new module - md5($username.0.$pass). Search speed per hash on GF8800GS is 155M p/s.
- Increased maximum password length in the modules MD5.exe (to 55 characters) and MD5_Unicode.exe (to 27 characters).
View user's profile Send private message
PostPosted: Sat Dec 12, 2009 3:16 pm Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.6.

In the new version:
- Added support for MultiGPU, i.e. simultaneous use of all GPU cores for attack (maximum number of GPU - 16).
- Added new hashing module: LM.exe.
- Maximum number of salted hashes per attack increased to 512, etc.
More >>
View user's profile Send private message
PostPosted: Sun Feb 07, 2010 6:11 pm Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.6.1.

In the new version:
- Added new module MD5(Unix).exe.
The attack speed per hash in this module makes (on GeForce 8800GS) about 85k p/s.
- Added displaying information on the duration of attack.
- Added new parameters to INI files.
More >>
View user's profile Send private message
PostPosted: Tue Feb 16, 2010 10:33 am Reply with quote
dhukkaman
Beginner
Beginner
 
Joined: Feb 15, 2010
Posts: 3




Sorry to be a total noob but how do I get the hashes I want to crack to be run with the program? I have been searching for ages to find how this is done but haven't got anywhere.

Please could you explain it simply for us learners out here.
View user's profile Send private message
PostPosted: Tue Feb 16, 2010 2:55 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




dhukkaman wrote:
Sorry to be a total noob but how do I get the hashes I want to crack to be run with the program? I have been searching for ages to find how this is done but haven't got anywhere.

Please could you explain it simply for us learners out here.


Those hashes are usually stored in sql database and of course they are protected from malicious persons. But there are scenarios as:

1. sql injection vulnerabilities - attacker can manipulate database so that hash retrieval is possible (lazy software developers and website admins)
2. phpmyadmin interface can unprotected and accessible from web (lazy admins)
3. sql database backup file can be accessible from web (lazy admins ...)
4. LFI/RFI/Remote File Disclosure and other vulnerabilities can finally lead to the hash retrieval from database
5. open TCP port 3306 with weakly configured mysql daemon and weak username/password (such as root user with empty password)
6. googledork:

http://www.google.ee/#hl=et&q=filetype%3Asql+phpmyadmin+dump+members+converge&lr=&aq=&oq=&fp=9a016538702b090f

More good information:

http://www.hackersforcharity.org/ghdb/
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Tue Feb 16, 2010 6:37 pm Reply with quote
dhukkaman
Beginner
Beginner
 
Joined: Feb 15, 2010
Posts: 3




waraxe wrote:
dhukkaman wrote:
Sorry to be a total noob but how do I get the hashes I want to crack to be run with the program? I have been searching for ages to find how this is done but haven't got anywhere.

Please could you explain it simply for us learners out here.


Those hashes are usually stored in sql database and of course they are protected from malicious persons. But there are scenarios as:

1. sql injection vulnerabilities - attacker can manipulate database so that hash retrieval is possible (lazy software developers and website admins)
2. phpmyadmin interface can unprotected and accessible from web (lazy admins)
3. sql database backup file can be accessible from web (lazy admins ...)
4. LFI/RFI/Remote File Disclosure and other vulnerabilities can finally lead to the hash retrieval from database
5. open TCP port 3306 with weakly configured mysql daemon and weak username/password (such as root user with empty password)
6. googledork:

http://www.google.ee/#hl=et&q=filetype%3Asql+phpmyadmin+dump+members+converge&lr=&aq=&oq=&fp=9a016538702b090f

More good information:

http://www.hackersforcharity.org/ghdb/


Thank you for the reply and the information.

Yes, the hashes are from my mysql database but my question was rather what do I do with them with extreme gpu bruteforcer?
View user's profile Send private message
PostPosted: Sat Oct 09, 2010 5:01 pm Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.7
In the new version, we have added dictionary attack and many other new features.
More >>>
View user's profile Send private message
PostPosted: Tue Oct 12, 2010 9:21 am Reply with quote
Turbo_boy
Regular user
Regular user
 
Joined: May 16, 2009
Posts: 7
Location: Netherlands




I want ATI support!
View user's profile Send private message
PostPosted: Tue Oct 19, 2010 6:03 pm Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Added hashing modules MD5(phpBB3).exe and MD5(Wordpress).exe; i.e. now you can run very fast dictionary attacks on hashes with signatures $H$7, $H$9 and $P$B.

For example, on NVIDIA GTS250 my attack speed on hashes of these types is almost 90 times higher than in PasswordsPro.
More >>>
View user's profile Send private message
PostPosted: Sat Jan 15, 2011 7:01 pm Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.8 >>>
View user's profile Send private message
PostPosted: Fri Feb 04, 2011 5:05 am Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.8.1 >>>
View user's profile Send private message
PostPosted: Thu Jun 09, 2011 5:23 pm Reply with quote
InsidePro
Active user
Active user
 
Joined: Sep 13, 2008
Posts: 28




Extreme GPU Bruteforcer has been updated to version 1.9.

In the new version:
- The number of salted hashes for attack is now literally unlimited and may reach 5000000.
- More >>>
View user's profile Send private message
PostPosted: Sun Jun 26, 2011 9:44 am Reply with quote
pktun420
Advanced user
Advanced user
 
Joined: Jun 08, 2010
Posts: 93




Gr8 Work i like it Smile !!!
View user's profile Send private message Send e-mail
PostPosted: Mon Jun 27, 2011 12:17 pm Reply with quote
pktun420
Advanced user
Advanced user
 
Joined: Jun 08, 2010
Posts: 93




is it possible that we can start password length from 1-10 then 10 to 11 on EGB for cracking hashes so we can use multiple machines for cracking hashes. i dont know much about cracking hashes. but this is just suggestion to crack hashes on multiple machines.

sorry for my english i hope you get my point.
View user's profile Send private message Send e-mail
EGB v1.3
  www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 2 of 3  
Goto page Previous  1, 2, 3  Next
  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.177 Seconds