Waraxe IT Security Portal
Login or Register
November 10, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 130
Members: 0
Total: 130
Full disclosure
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
APPLE-SA-10-28-2024-3 macOS Sequoia 15.1
APPLE-SA-10-28-2024-2 iOS 17.7.1 and iPadOS 17.7.1
APPLE-SA-10-28-2024-1 iOS 18.1 and iPadOS 18.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Hash related information -> hashcat
Post new topicReply to topic View previous topic :: View next topic
hashcat
PostPosted: Thu Dec 24, 2009 10:23 pm Reply with quote
K99
Regular user
Regular user
Joined: Dec 25, 2009
Posts: 11






* Free
* Multi-Threaded
* Multi-Hash
* Linux & Windows native binaries
* Fastest cpu-based multihash cracker
* SSE2 accelerated
* All Attack-Modes except Brute-Force and Permutation can be extended by Hybrid-Attack rules
* Very fast Hybrid-Attack engine
* Rules mostly compatible with JTR and PasswordsPro
* Possible to resume or limit session
* Automatically recognizes recovered hashes from outfile at startup
* Can automatically generate random rules for Hybrid-Attack
* Load hashlist with more than 3 million hashes of any type at once
* Load saltlist from external file and then use them in a Brute-Force Attack variant
* Able to work in an distributed environment
* Specify multiple wordlists and also multiple directories of wordlists
* Number of threads can be configured
* Threads run on lowest priority
* 33+ Algorithms implemented with performance in mind
* ... and much more



* MD5
* md5($pass.$salt)
* md5($salt.$pass)
* md5(md5($pass))
* md5(md5(md5($pass)))
* md5(md5($pass).$salt)
* md5(md5($salt).$pass)
* md5($salt.md5($pass))
* md5($salt.$pass.$salt)
* md5(md5($salt).md5($pass))
* md5(md5($pass).md5($salt))
* md5($salt.md5($salt.$pass))
* md5($salt.md5($pass.$salt))
* md5($username.0.$pass)
* md5(strtoupper(md5($pass)))
* SHA1
* sha1($pass.$salt)
* sha1($salt.$pass)
* sha1(sha1($pass))
* sha1(sha1(sha1($pass)))
* sha1(strtolower($username).$pass)
* MySQL
* MySQL4.1/MySQL5
* MD5(Wordpress)
* MD5(phpBB3)
* MD5(Unix)
* SHA-1(Base64)
* SSHA-1(Base64)
* SHA-1(Django)
* MD4
* NTLM
* Domain Cached Credentials
* MD5(Chap)
* MSSQL

Attack-Modes

* Straight *
* Combination *
* Toggle-Case *
* Brute-Force
* Permutation

* accept Hybrid-Attack extension


Tested OS

* Windows XP 32bit
* Windows XP 64bit
* Windows Vista 64bit
* Windows 7 64bit
* Debian Lenny 32bit
* Ubuntu 9.02 64bit
* Ubuntu 9.10 64bit

Check the speed at the website or take a look t this chart:



http://hashcat.net/hashcat/

irc://irc.rizon.net/hashcat


Last edited by K99 on Sat May 01, 2010 9:16 pm; edited 1 time in total
View user's profile Send private message
PostPosted: Mon Jan 04, 2010 7:42 pm Reply with quote
K99
Regular user
Regular user
Joined: Dec 25, 2009
Posts: 11




New version released: hashcat v0.31

http://hashkiller.com/index.php?topic=2605
View user's profile Send private message
PostPosted: Mon Jan 04, 2010 10:55 pm Reply with quote
vince213333
Advanced user
Advanced user
Joined: Aug 03, 2009
Posts: 737
Location: Belgium




Thanks Smile

I surely recommend this program to anyone with a processor with multiple cores, it does go a lot faster than passwordspro for example.
View user's profile Send private message
PostPosted: Tue Feb 23, 2010 3:11 pm Reply with quote
K99
Regular user
Regular user
Joined: Dec 25, 2009
Posts: 11




Many new features, bug fixes and improvements:

http://hashkiller.com/index.php?board=43.0
View user's profile Send private message
PostPosted: Tue Feb 23, 2010 6:04 pm Reply with quote
vince213333
Advanced user
Advanced user
Joined: Aug 03, 2009
Posts: 737
Location: Belgium




Thanks for the update Wink
View user's profile Send private message
PostPosted: Tue Mar 16, 2010 10:17 pm Reply with quote
BoboTiG
Advanced user
Advanced user
Joined: Jun 22, 2009
Posts: 66




Hey, seems nice !

I will give you returns after tests. Good continuation Smile
View user's profile Send private message Visit poster's website
PostPosted: Wed Mar 17, 2010 4:57 am Reply with quote
capt
Advanced user
Advanced user
Joined: Nov 04, 2008
Posts: 232




Yea vince introduced this to me and its a great tool. Great speed and results for me ^^
View user's profile Send private message Visit poster's website MSN Messenger
PostPosted: Wed Mar 17, 2010 12:43 pm Reply with quote
vince213333
Advanced user
Advanced user
Joined: Aug 03, 2009
Posts: 737
Location: Belgium




Been using it ever since i first saw it Smile Glad you like it Wink
View user's profile Send private message
PostPosted: Sat May 01, 2010 9:17 pm Reply with quote
K99
Regular user
Regular user
Joined: Dec 25, 2009
Posts: 11




Update: The new version is even faster. More algorithms added and some bugs got fixed. Check out the new site: http://hashcat.net/hashcat/
View user's profile Send private message
PostPosted: Sat May 01, 2010 9:46 pm Reply with quote
capt
Advanced user
Advanced user
Joined: Nov 04, 2008
Posts: 232




very nice man <3in the hybrid attack.
View user's profile Send private message Visit poster's website MSN Messenger
PostPosted: Thu Jan 20, 2011 7:57 pm Reply with quote
K99
Regular user
Regular user
Joined: Dec 25, 2009
Posts: 11




The last version of hashcat is hashcat v0.35

performance v0.34 -> v0.35

Quote:
MD4 based (NTLM, DCC, ...):

1 hash: v0.34 = 9.64M/s, v0.35 = 11.06M/s = + 12.8%
2 hash: v0.34 = 6.70M/s, v0.35 = 6.84M/s = + 2.0%

MD5 based (MD5, md5crypt, phpass, ...):

1 hash: v0.34 = 7.27M/s, v0.35 = 9.05M/s = + 19.6%
2 hash: v0.34 = 5.43M/s, v0.35 = 6.04M/s = + 10.0%

SHA1 based (SHA1, MYSQL4, ...):

1 hash: v0.34 = 4.99M/s, v0.35 = 5.25M/s = + 5.0%
2 hash: v0.34 = 4.06M/s, v0.35 = 4.09M/s = + 0.8%


It supports the following algorithms:

* MD5
* md5($pass.$salt)
* md5($salt.$pass)
* md5(md5($pass))
* md5(md5(md5($pass)))
* md5(md5($pass).$salt)
* md5(md5($salt).$pass)
* md5($salt.md5($pass))
* md5($salt.$pass.$salt)
* md5(md5($salt).md5($pass))
* md5(md5($pass).md5($salt))
* md5($salt.md5($salt.$pass))
* md5($salt.md5($pass.$salt))
* md5($username.0.$pass)
* md5(strtoupper(md5($pass)))
* SHA1
* sha1($pass.$salt)
* sha1($salt.$pass)
* sha1(sha1($pass))
* sha1(sha1(sha1($pass)))
* sha1(strtolower($username).$pass)
* MySQL
* MySQL4.1/MySQL5
* MD5(Wordpress)
* MD5(phpBB3)
* MD5(Unix)
* SHA-1(Base64)
* SSHA-1(Base64)
* SHA-1(Django)
* MD4
* NTLM
* Domain Cached Credentials
* MD5(Chap)
* MSSQL
* SHA-256


You can get it here:
http://hashcat.net/hashcat/
View user's profile Send private message
hashcat
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.046 Seconds