Questions tagged [hashcat]

This tag should be used with questions about using, debugging, optimizing, or otherwise involving hashcat, a password recovery tool. This tag helps organize hashcat-specific questions that might otherwise be placed under more general tags, such as hash or brute-force.

Hashcat is the world’s fastest CPU-based password recovery tool.

While it's not as fast as its GPU counterpart oclHashcat, large lists can be easily split in half with a good dictionary and a bit of knowledge of the command switches.

Background

Hashcat was written somewhere in the middle of 2009. Yes, there were already close-to-perfect working tools supporting rule-based attacks like “PasswordsPro”, “John The Ripper”. However for some unknown reason, both of them did not support multi-threading. That was the only reason to write Hashcat: To make use of the multiple cores of modern CPUs.

Granted, that was not 100% correct. John the Ripper already supported MPI using a patch, but at that time it worked only for Brute-Force attack. There was no solution available to crack plain MD5 which supports MPI using rule-based attacks.

Hashcat, from its first version, v0.01, was called “atomcrack”. This version was very poor, but at least the MD5 kernel was written in assembler utilizing SSE2 instructions and of course it was multi-threaded. It was a simple dictionary cracker, nothing more. But it was fast. Really fast.

Some guys from the scene become interested in it and after one week there were around 10 beta testers. Everything worked fine and so requests for more algorithm types, a rule-engine for mutation of dictionaries, a windows version and different attack modes were added. These developments took around half a year, and were completely non-public.

Then, with version 0.29, “atomcrack” was renamed to “Dr. Hash”. Then with the release of version 0.30 to “hashcat”.

The first official hashcat release was v0.30, released on 24.12.2009.

Starting with hashcat release v0.40, released on 05.08.2012, binaries for Mac OSX were added.

58 questions
0
votes
1 answer

can cntlm hashes be cracked with hashcat?

I generate the hash of password 'aaa' with cntlm: $ cntlm -H Password: PassLM E3C5D4926C65EFDE552C4BCA4AEBFB11 PassNT 1DBEF96BD40C7430A8595B4D6FE91009 PassNTLMv2 4400F4365FB00A5291008FF563C23C5E # Only for user '',…
stsp
  • 308
  • 1
  • 6
0
votes
3 answers

Error running hashcat commands

Ive recently downloaded the latest version of hashcat from github, and am not trying to run a basic bruteforce attach on the sample hashes provided. However, despite reading the documentation I consistently get the following error, where ?a?a?a is…
Conor W
  • 41
  • 1
  • 3
0
votes
2 answers

HashCat bcrypt $2*$, Blowfish (Unix) Line-length exception

Hello I attempting to use HashCat example hash to decrypt the example on their page using bcrypt $2*$, Blowfish (Unix) Using the hash of there example: $2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6 I am using this command on…
Reptic
  • 175
  • 3
  • 4
  • 13
0
votes
1 answer

continuous read from subprocess.Popen

In Python, I have a question about the subprocess.Popen function, my problem is that I can't get my head around a continuous read of stdout stream. When I use communicate() at the end of my function, I get my preferred output. But I have two…
friluk
  • 1
  • 2
0
votes
1 answer

Cracking hash knowing password length?

I do know the password length is 24. I also do know the search space: lower case, upper case and digits. The combinations should be (26+26+10)^24 = 62^24, right? I've tried with hashcat to set the charset and the mask -1 ?l?u?d filename_to_crack…
Juno
  • 1
  • 1
  • 2
0
votes
2 answers

hashcat for md5($salt.$pass)

How could i use hashcat to crack this hash? Syntax: md5(eWVzX3RoaXNfaXNfdmVyeV9sb25nX3NhbHRfdG9vpassword@123) = 531e89f00f009ced5e0001e33758d3c3 Salt: eWVzX3RoaXNfaXNfdmVyeV9sb25nX3NhbHRfdG9v Plaintext: password@123 MD5:…
David Mathias
  • 1
  • 1
  • 1
  • 2
0
votes
2 answers

Create a wordlist using hashcat?

Hashcat doesn't support the target application I'm trying to crack, but I'm wondering whether the mask function can be 'fed' the list of passwords and parsed through the rockyou rule to generate an effective wordlist for me? If so, how can this be…
0
votes
1 answer

Produce a Hash from Keepass with Keyfile

How to produce a hash value from Keepass 2 AES / with keyfile ? I tried keepass2john.py, but there is no argument for key file. Keepass 2 AES / with keyfile …
Leongelis
  • 101
  • 1
  • 3
0
votes
1 answer

MD5($pwd . $salt) Hashcat Commands

Trying to brute force a basic hash of a plaintext password and a hash... But having difficulty with the hashcat commands. I'm unsure how to specify what my salt is. I've selected that the -m command is (10) and -a 3 for brute force, but whenever I…
JWinstanley
  • 31
  • 1
  • 1
  • 6
-1
votes
1 answer

Terminal: Hashcat charset - no matches found

I'm trying to run hashcat to crack a zip file using the brute force method and I want to specify the character set using the below code in Mac M1 terminal: (where hcat.txt contains the hash of the zip file) hashcat -a 3 -m 17225 --force hcat.txt…
JackeyOL
  • 313
  • 2
  • 16
-1
votes
1 answer

Brew does not work when installing (hashcat)

I had this problem... so i tried to install hashcat via homebrew, but i got this error back: command used: brew install hashcat ==> Searching for similarly named formulae... Error: No similarly named formulae found. Error: No available formula or…
Tetie
  • 365
  • 1
  • 14
-1
votes
1 answer

hashcat - toggle-case dictionary attack (case sensitive)

I'm new to computer security but I'm trying the same to make a toggle case attack starting from a dictionary password. I read there that it's possible to alternate uppercase and lower case word starting from a dictionary to have all combinations…
user13104092
-2
votes
1 answer

how to fix this Separator unmatched and wordlist.txt: No such file or directory?

MacBook:~ apple$ `hashcat -m 22000 capture.hccapx wordlist.txt` hashcat (v6.2.5) starting wordlist.txt: No such file or directory Started: Thu *** ** 14:36:23 **** Stopped: Thu ** ** 14:36:23 **** MacBook:~ apple$ `hashcat -m 22000 -a3…
JMAA
  • 1
  • 1
  • 1
1 2 3
4