HashCat v0.49 'Advanced Password Recovery' 'Many Tutorials'

Discussion in 'Hash Cracking' started by Pяɪиcє σƒ Pяeмiuм, Apr 1, 2015.

  1. Pяɪиcє σƒ Pяeмiuм

    Pяɪиcє σƒ Pяeмiuм Active Member Diamond

    Messages:
    705
    Likes:
    2,626
    Ratio:
    57.73
    [​IMG]


    Features

    • Multi-Threaded
    • Free
    • Multi-Hash (up to 24 million hashes)
    • Multi-OS (Linux, Windows and OSX native binaries)
    • Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...)
    • SSE2, AVX and XOP accelerated
    • All Attack-Modes except Brute-Force and Permutation can be extended by rules
    • Very fast Rule-engine
    • Rules compatible with JTR and PasswordsPro
    • Possible to resume or limit session
    • Automatically recognizes recovered hashes from outfile at startup
    • Can automatically generate random rules
    • Load saltlist from external file and then use them in a Brute-Force Attack variant
    • Able to work in an distributed environment
    • Specify multiple wordlists or multiple directories of wordlists
    • Number of threads can be configured
    • Threads run on lowest priority
    • Supports hex-charset
    • Supports hex-salt
    • 90+ Algorithms implemented with performance in mind
    • ... and much more


    Algorithms


    • MD5
    • md5($pass.$salt)
    • md5($salt.$pass)
    • md5(unicode($pass).$salt)
    • md5($salt.unicode($pass))
    • HMAC-MD5 (key = $pass)
    • HMAC-MD5 (key = $salt)
    • SHA1
    • sha1($pass.$salt)
    • sha1($salt.$pass)
    • sha1(unicode($pass).$salt)
    • sha1($salt.unicode($pass))
    • HMAC-SHA1 (key = $pass)
    • HMAC-SHA1 (key = $salt)
    • MySQL323
    • MySQL4.1/MySQL5
    • phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla)
    • md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
    • MD4
    • NTLM
    • Domain Cached Credentials, mscash
    • SHA256
    • sha256($pass.$salt)
    • sha256($salt.$pass)
    • sha256(unicode($pass).$salt)
    • sha256($salt.unicode($pass))
    • HMAC-SHA256 (key = $pass)
    • HMAC-SHA256 (key = $salt)
    • md5apr1, MD5(APR), Apache MD5
    • SHA512
    • sha512($pass.$salt)
    • sha512($salt.$pass)
    • sha512(unicode($pass).$salt)
    • sha512($salt.unicode($pass))
    • HMAC-SHA512 (key = $pass)
    • HMAC-SHA512 (key = $salt)
    • SHA-512(Unix)
    • Cisco-PIX MD5
    • Cisco-ASA MD5
    • WPA/WPA2
    • Double MD5
    • bcrypt, Blowfish(OpenBSD)
    • MD5(Sun)
    • md5(md5(md5($pass)))
    • md5(md5($salt).$pass)
    • md5($salt.md5($pass))
    • md5($pass.md5($salt))
    • md5($salt.$pass.$salt)
    • md5(md5($pass).md5($salt))
    • md5($salt.md5($salt.$pass))
    • md5($salt.md5($pass.$salt))
    • md5($username.0.$pass)
    • md5(strtoupper(md5($pass)))
    • md5(sha1($pass))
    • Double SHA1
    • sha1(sha1(sha1($pass)))
    • sha1(md5($pass))
    • sha1($salt.$pass.$salt)
    • MD5(Chap), iSCSI CHAP authentication
    • SHA-3(Keccak)
    • Half MD5
    • Password Safe SHA-256
    • IKE-PSK MD5
    • IKE-PSK SHA1
    • NetNTLMv1-VANILLA / NetNTLMv1-ESS
    • NetNTLMv2
    • Cisco-IOS SHA256
    • Android PIN
    • AIX {smd5}
    • AIX {ssha256}
    • AIX {ssha512}
    • AIX {ssha1}
    • GOST, GOST R 34.11-94
    • Fortigate (FortiOS)
    • OS X v10.8 / v10.9
    • GRUB 2
    • IPMI2 RAKP HMAC-SHA1
    • sha256crypt, SHA256(Unix)
    • Drupal7
    • WBB3, Woltlab Burning Board 3
    • scrypt
    • Cisco $8$
    • Cisco $9$
    • Radmin2
    • Django (PBKDF2-SHA256)
    • Cram MD5
    • SAP CODVN H (PWDSALTEDHASH) iSSHA-1
    • Plaintext
    • Joomla < 2.5.18
    • PostgreSQL
    • osCommerce, xt:Commerce
    • Skype
    • nsldap, SHA-1(Base64), Netscape LDAP SHA
    • nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
    • Oracle 11g/12c
    • SMF > v1.1
    • OS X v10.4, v10.5, v10.6
    • EPi
    • Django (SHA-1)
    • MSSQL(2000)
    • MSSQL(2005)
    • PeopleSoft
    • EPiServer 6.x < v4
    • hMailServer
    • EPiServer 6.x > v4
    • SSHA-512(Base64), LDAP {SSHA512}
    • OS X v10.7
    • MSSQL(2012 & 2014)
    • vBulletin < v3.8.5
    • PHPS
    • vBulletin > v3.8.5
    • IPB2+, MyBB1.2+
    • Mediawiki B type
    • WebEdition CMS
    • Redmine Project Management Web App


    Tested OS

    All Linux, Windows and OSX versions should work on both 32 and 64 bit

    Hidden Content:
    You must 'reply' before you can see the hidden content.
     
  2. Anto2363

    Anto2363 Basic Member

    Messages:
    872
    Likes:
    175
    Ratio:
    0.04
    Many Thanks
     
  3. General Custard

    General Custard Basic Member

    Messages:
    907
    Likes:
    85
    Ratio:
    0.2
    Thank you for sharing will be needing to learn about using hashcat
     
  4. Nemesis

    Nemesis Basic Member

    Messages:
    239
    Likes:
    138
    Ratio:
    0.1
    Thanks for sharing, goingto take a look at the tutorials.
     
  5. Sinder

    Sinder Advanced Member

    Messages:
    1,341
    Likes:
    720
    Ratio:
    2.47
    thanks
     
  6. Vamos

    Vamos Basic Member

    Messages:
    175
    Likes:
    3
    Ratio:
    0.02
    Thanks for this bro I have been recommended HashCat
     
  7. Falcon

    Falcon Basic Member

    Messages:
    611
    Likes:
    289
    Ratio:
    0.25
    Damn, sounds tricky but I need this.
     
  8. nunik

    nunik Banned

    Messages:
    45
    Likes:
    0
    Ratio:
    0
    Thanks for sharing this :)
     
  9. PopekMonster

    PopekMonster Banned Scammer

    Messages:
    446
    Likes:
    71
    Ratio:
    0.02
    thanks mate
     
  10. m1st

    m1st Well-Known Member Elite

    Messages:
    2,762
    Likes:
    1,736
    Ratio:
    1.71
    Thanks you :)
     
  11. Phatz

    Phatz Banned

    Messages:
    300
    Likes:
    40
    Ratio:
    0.2
    Thanks very much :) +1
     
  12. RespectN

    RespectN Active Member

    Messages:
    768
    Likes:
    493
    Ratio:
    0.73
    Thank you bro :)
     
  13. seNs

    seNs Active Member

    Messages:
    970
    Likes:
    663
    Ratio:
    1.06
    thanks for share mate
     
  14. Bangerz

    Bangerz Basic Member

    Messages:
    1,111
    Likes:
    339
    Ratio:
    0.26
    Lemme test it :)
     
  15. Mario_

    Mario_ Basic Member

    Messages:
    509
    Likes:
    132
    Ratio:
    0.05
    thanks bro
     
  16. MTZinakis

    MTZinakis Banned

    Messages:
    312
    Likes:
    28
    Ratio:
    0.04
    thx man, trying to understand how to decrypt combos
     
  17. Nick3523

    Nick3523 Basic Member

    Messages:
    1,196
    Likes:
    692
    Ratio:
    0.36
    Many thanks bro :)
     
  18. SirZio

    SirZio Member

    Messages:
    492
    Likes:
    119
    Ratio:
    0.04
    Thanks bro
     
  19. iCare

    iCare New Member

    Messages:
    684
    Likes:
    522
    Ratio:
    0.13
    Thanks dude!
     
  20. Brinkerz

    Brinkerz Member

    Messages:
    65
    Likes:
    1
    Ratio:
    0
    Thanks for this in advance :)
     

Share This Page