hashcat v3.5.0,crack Blake2b,hashcat gui,hashcat windows

hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.

Change log v3.5.0+76:

Algorithms
– Added hash-mode 600 = Blake2-512
– Added hash-mode 15200 = Blockchain, My Wallet, V2

Features
– Wordlist encoding: Support added for internal convert from and to user-defined encoding during runtime
– Wordlist encoding: Added parameters –encoding-from and –encoding-to to configure wordlist encoding handling
– Rules: Support added for rule ‘eX’

Improvements
– WPA cracking: Improved nonce-error-corrections mode to fix corrupt nonce generated on Big-Endian devices

Bugs
– Fixed a missing type specifier in a function declaration of the RACF kernel

Technical
– Building: On binary release package, link libiconv static for windows binaries
– Dictstat: Structure for dictstat file changed as it has to include –encoding-from and –encoding-to parameter now
– OpenCL Runtime: Updated AMDGPU-Pro driver version check, do warn if version 17.10 is detected which is known to be broken
– WPA cracking: Reduced –nonce-error-corrections default from 16 to 8 to compensate speed drop caused due to Big-Endian fixes

Example: Crack Blake2-512 hash

root@et:~/hashcat# ./hashcat -m 600 hash -a 3 ?a?a?a?a?a?a?a -w 3
hashcat (v3.5.0-76-gb924901+) starting…

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1080, 2026/8107 MB allocatable, 20MCU
* Device #2: GeForce GTX 1080, 2028/8114 MB allocatable, 20MCU
* Device #3: GeForce GTX 1080, 2028/8114 MB allocatable, 20MCU
* Device #4: GeForce GTX 1080, 2028/8114 MB allocatable, 20MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force
* Raw-Hash
* Uses-64-Bit

Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 75c

$BLAKE2$296c269e70ac5f0095e6fb47693480f0f7b97ccd030…283b1e:hashcat

Session……….: hashcat
Status………..: Cracked
Hash.Type……..: Blake2-512
Hash.Target……: $BLAKE2$296c269e70ac5f0095e6fb47693480f0f7b97ccd030…283b1e
Time.Started…..: Wed May 3 16:42:00 2017 (9 secs)
Time.Estimated…: Wed May 3 19:31:41 2017 (2 hours, 49 mins)
Guess.Mask…….: ?a?a?a?a?a?a?a [7]
Guess.Queue……: 1/1 (100.00%)
Speed.Dev.#1…..: 1717.7 MH/s (97.50ms)
Speed.Dev.#2…..: 1714.6 MH/s (97.30ms)
Speed.Dev.#3…..: 1734.6 MH/s (96.50ms)
Speed.Dev.#4…..: 1732.5 MH/s (96.63ms)
Speed.Dev.#*…..: 6899.4 MH/s
Recovered……..: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress………: 60004106240/69833729609375 (0.09%)
Rejected………: 0/60004106240 (0.00%)
Restore.Point….: 0/81450625 (0.00%)
Candidates.#1….: x31anan -> )mitgBA
Candidates.#2….: |qa4Jut -> jolgpen
Candidates.#3….: :herwIA -> 5jooN10
Candidates.#4….: :heuzen -> 5jovMku
HWMon.Dev.#1…..: Temp: 49c Fan: 33% Util:100% Core:1901MHz Mem:4513MHz Bus:1
HWMon.Dev.#2…..: Temp: 54c Fan: 33% Util:100% Core:1901MHz Mem:4513MHz Bus:1
HWMon.Dev.#3…..: Temp: 49c Fan: 33% Util:100% Core:1901MHz Mem:4513MHz Bus:1
HWMon.Dev.#4…..: Temp: 54c Fan: 33% Util:100% Core:1901MHz Mem:4513MHz Bus:1

Started: Wed May 3 16:41:55 2017
Stopped: Wed May 3 16:42:09 2017

Download

The post hashcat v3.5.0+76 release | Added support to crack Blake2b appeared first on Penetration Testing in Linux. http://ift.tt/2q00I5G http://ift.tt/2aM8QhC

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s