12x GPU Monster For SALE by HashKiller Owner

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - hashcat multi-handshake hccapx issues - need testers


9 Results - Page 1 of 1 -
1
Author Message
Avatar
gpuhash_me

Status: Trusted
Joined: Sun, 08 Nov 2015
Posts: 859
Team: gpuhash team
Reputation: 1605 Reputation
Online
Wed, 08 Mar 2017 @ 05:00:59

We found that hashcat 3.40 sometimes skip passwords in multi-handshake hccapx v.4 files:

https://github.com/hashcat/hashcat/issues/1166

(this issue was first mentioned here: https://forum.hashkiller.co.uk/topic-view.aspx?t=17767&m=121510#121510)

Atom has made few commits and now latest beta works as expected.

But we still need more tests so we ask HK members to try attached hccapx with ?d?d?d?d?d?d?d?d mask (please try current stable hashcat and latest beta from hashcat.net/beta).
Please share your results (gpu model, driver version, number of passwords found).


Head of cheap publicity department
Support, discounts, free offers for HK members
BTC: 1GPUHASHckzcL2fDXyGSc2WNqpFjJZbFaN

Attachments: Login to view attachments.
Avatar
andy71

Status: n/a
Joined: Tue, 07 Feb 2017
Posts: 15
Team:
Reputation: 5 Reputation
Offline
Wed, 08 Mar 2017 @ 07:33:53

RX 480, 17.2.1,

hashcat 3.40 (stable) - 1 password found
hashcat 3.40 beta - 10 passwords found

Session..........: test
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: test_new.hccapx
Time.Started.....: Wed Mar 08 07:05:39 2017 (8 mins, 5 secs)
Time.Estimated...: Wed Mar 08 07:13:44 2017 (0 secs)
Input.Mask.......: ?d?d?d?d?d?d?d?d [8]
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#2.....: 2649.9 kH/s (10.05ms)
Recovered........: 1/10 (10.00%) Digests, 1/10 (10.00%) Salts
Progress.........: 1000000000/1000000000 (100.00%)
Rejected.........: 0/1000000000 (0.00%)
Restore.Point....: 10000000/10000000 (100.00%)
Candidates.#2....: 94919059 -> 96493939
HWMon.Dev.#2.....: Fan: 0% Util: 1% Core:1288MHz Mem:2000MHz Lanes:16

Session..........: test_beta
Status...........: Cracked
Hash.Type........: WPA/WPA2
Hash.Target......: test_new.hccapx
Time.Started.....: Wed Mar 08 07:21:02 2017 (12 mins, 11 secs)
Time.Estimated...: Wed Mar 08 07:33:13 2017 (0 secs)
Input.Mask.......: ?d?d?d?d?d?d?d?d [8]
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#2.....: 194.7 kH/s (10.78ms)
Recovered........: 10/10 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 77266944/100000000 (77.27%)
Rejected.........: 0/77266944 (0.00%)
Restore.Point....: 7667712/10000000 (76.68%)
Candidates.#2....: 20186762 -> 29152646
HWMon.Dev.#2.....: Fan: 0% Util: 0% Core:1283MHz Mem:2000MHz Lanes:16


Avatar
gpuhash_me

Status: Trusted
Joined: Sun, 08 Nov 2015
Posts: 859
Team: gpuhash team
Reputation: 1605 Reputation
Online
Wed, 08 Mar 2017 @ 08:33:02

Tnank you andy71


Head of cheap publicity department
Support, discounts, free offers for HK members
BTC: 1GPUHASHckzcL2fDXyGSc2WNqpFjJZbFaN

Avatar
frenchy1

Status: Cracker
Joined: Tue, 28 Jul 2015
Posts: 651
Team:
Reputation: 396 Reputation
Offline
Fri, 10 Mar 2017 @ 06:26:41

beta

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

Session..........: hashcat
Status...........: Running
Hash.Type........: WPA/WPA2
Hash.Target......: C:\Users\x\Downloads\test_new.hccapx
Time.Started.....: Fri Mar 10 17:22:07 2017 (1 min, 42 secs)
Time.Estimated...: Fri Mar 10 17:25:43 2017 (1 min, 54 secs)
Input.Mask.......: ?d?d?d?d?d?d?d?d [8]
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 305.6 kH/s (49.89ms)
Speed.Dev.#2.....: 159.7 kH/s (92.66ms)
Speed.Dev.#*.....: 465.2 kH/s
Recovered........: 5/10 (50.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 46653440/100000000 (46.65%)
Rejected.........: 0/46653440 (0.00%)
Restore.Point....: 3727360/10000000 (37.27%)
Candidates.#1....: 62346452 -> 66301461
Candidates.#2....: 02680582 -> 06493341
HWMon.Dev.#1.....: Temp: 71c Fan:100% Util: 82% Core: 14MHz Mem:4513MHz Lanes:16
HWMon.Dev.#2.....: Temp: 77c Fan: 89% Util: 98% Core: 27MHz Mem:3802MHz Lanes:1

968017d9a893a5c7bf84ff4dedfca53a:4cf2bf2a4c94:44636afbbe9e:WiFi-29:22921798
4e5be0655df400be6de627dec1ac546e:4cf2bf2a4c94:44636afbbe9e:WiFi-29:19946721
b9811db9f68d593024f96a5a8301c21a:4cf2bf2a4c94:44636afbbe9e:WiFi-29:12299156
b0db3602e163a4949205eaaa1a80f3a1:4cf2bf2a4c94:44636afbbe9e:WiFi-29:69596067
c82f9dafd56006a69f4c5d7f41e04525:4cf2bf2a4c94:44636afbbe9e:WiFi-29:11857422
c1dfef02f2bf0213b7a7e9c8bc4a6d2a:4cf2bf2a4c94:44636afbbe9e:WiFi-29:15030302
c6dff2b54927e29c0d089e111201b379:4cf2bf2a4c94:44636afbbe9e:WiFi-29:22380172
2596ca2f3d0296d30c7a997407eb79f5:4cf2bf2a4c94:44636afbbe9e:WiFi-29:30973991
b452f54ffca712b1cf5dff9f823e07e6:4cf2bf2a4c94:44636afbbe9e:WiFi-29:13786246
7bf1188bf63c75506d894cc0a88c6640:4cf2bf2a4c94:44636afbbe9e:WiFi-29:26756926

3.4

2596ca2f3d0296d30c7a997407eb79f5:4cf2bf2a4c94:44636afbbe9e:WiFi-29:30973991
INFO: approaching final keyspace, workload adjusted


Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: C:\Users\x\Downloads\test_new.hccapx
Time.Started.....: Fri Mar 10 17:15:29 2017 (3 mins, 18 secs)
Time.Estimated...: Fri Mar 10 17:18:47 2017 (0 secs)
Input.Mask.......: ?d?d?d?d?d?d?d?d [8]
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 5119.3 kH/s (39.71ms)
Speed.Dev.#2.....: 2549.5 kH/s (38.56ms)
Speed.Dev.#*.....: 7668.8 kH/s
Recovered........: 1/10 (10.00%) Digests, 1/10 (10.00%) Salts
Progress.........: 1000000000/1000000000 (100.00%)
Rejected.........: 0/1000000000 (0.00%)
Restore.Point....: 9657049/10000000 (96.57%)
Candidates.#1....: 96554363 -> 96493939
Candidates.#2....: 92188873 -> 97886273
HWMon.Dev.#1.....: Temp: 69c Fan:100% Util: 8% Core: 14MHz Mem:4513MHz Lanes:16
HWMon.Dev.#2.....: Temp: 60c Fan:100% Util: 0% Core: 163MHz Mem:3802MHz Lanes:1

Started: Fri Mar 10 17:15:23 2017
Stopped: Fri Mar 10 17:18:49 2017



Just a hobbyist

Avatar
frenchy1

Status: Cracker
Joined: Tue, 28 Jul 2015
Posts: 651
Team:
Reputation: 396 Reputation
Offline
Fri, 10 Mar 2017 @ 06:46:20

i have another one

if i run a rule based attack when i know the password it is missing the password on both beta and 3.4. unless its my fault. i am trying to use a rule base attack to make use of the word in the text file and make it lower case and append two digits but no luck

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: MOMMAM (AP:e0:ca:94:b8:71:d6 STA:48:02:2a:09:91:98)
Time.Started.....: Fri Mar 10 17:39:24 2017 (0 secs)
Time.Estimated...: Fri Mar 10 17:39:24 2017 (0 secs)
Input.Base.......: File (C:\Users\x\Desktop\hashcat-3.40\mommam.txt)
Input.Mod........: Rules (C:\Users\x\Desktop\hashcat-3.40\one rule.txt)
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 0 H/s (0.00ms)
Speed.Dev.#2.....: 0 H/s (0.00ms)
Speed.Dev.#*.....: 0 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 1/1 (100.00%)
Restore.Point....: 0/1 (0.00%)
Candidates.#1....: [Copying]
Candidates.#2....: [Copying]
HWMon.Dev.#1.....: Temp: 44c Fan: 33% Util: 0% Core: 65MHz Mem:4513MHz Lanes:16
HWMon.Dev.#2.....: Temp: 58c Fan: 55% Util:100% Core: 65MHz Mem:3802MHz Lanes:1

Started: Fri Mar 10 17:39:17 2017
Stopped: Fri Mar 10 17:39:25 2017

and if i run a stdout

C:\Users\x>C:\Users\x\Desktop\hashcat-3.40\hashcat64.exe -m 2500 -w 3 --stdout C:\Users\x\Desktop\hashcat-3.40\mommam.txt -r "C:\Users\x\Desktop\hashcat-3.40\one rule.txt"
mommam88


and if i run bruteforce 27a730499071fdd4e5db542a8f79080e:e0ca94b871d6:48022a099198:MOMMAM:mommam88

Session..........: hashcat
Status...........: Cracked
Hash.Type........: WPA/WPA2
Hash.Target......: MOMMAM (AP:e0:ca:94:b8:71:d6 STA:48:02:2a:09:91:98)
Time.Started.....: Fri Mar 10 17:43:35 2017 (0 secs)
Time.Estimated...: Fri Mar 10 17:43:35 2017 (0 secs)
Input.Mask.......: mommam?d?d [8]
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 0 H/s (0.61ms)
Speed.Dev.#2.....: 0 H/s (0.00ms)
Speed.Dev.#*.....: 0 H/s
Recovered........: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 100/100 (100.00%)
Rejected.........: 0/100 (0.00%)
Restore.Point....: 0/100 (0.00%)
Candidates.#1....: mommam12 -> mommam59
Candidates.#2....: [Generating]
HWMon.Dev.#1.....: Temp: 50c Fan: 33% Util:100% Core: 65MHz Mem:4513MHz Lanes:16
HWMon.Dev.#2.....: Temp: 53c Fan: 33% Util:100% Core: 65MHz Mem:3802MHz Lanes:1

Started: Fri Mar 10 17:43:29 2017
Stopped: Fri Mar 10 17:43:36 2017

Any thoughts?




Just a hobbyist

Attachments: Login to view attachments.
Avatar
gpuhash_me

Status: Trusted
Joined: Sun, 08 Nov 2015
Posts: 859
Team: gpuhash team
Reputation: 1605 Reputation
Online
Fri, 10 Mar 2017 @ 07:37:32

frenchy1 said:

i have another one

if i run a rule based attack when i know the password it is missing the password on both beta and 3.4. unless its my fault. i am trying to use a rule base attack to make use of the word in the text file and make it lower case and append two digits but no luck

Any thoughts?

Interesting find, I think it is completely different issue. Will try your config too


Head of cheap publicity department
Support, discounts, free offers for HK members
BTC: 1GPUHASHckzcL2fDXyGSc2WNqpFjJZbFaN

Avatar
jHi6az3HB

Status: n/a
Joined: Fri, 24 Feb 2017
Posts: 9
Team:
Reputation: 0 Reputation
Offline
Sat, 11 Mar 2017 @ 19:50:13

frenchy1 said:


...

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: MOMMAM (AP:e0:ca:94:b8:71:d6 STA:48:02:2a:09:91:98)
Time.Started.....: Fri Mar 10 17:39:24 2017 (0 secs)
Time.Estimated...: Fri Mar 10 17:39:24 2017 (0 secs)
Input.Base.......: File (C:\Users\x\Desktop\hashcat-3.40\mommam.txt)
Input.Mod........: Rules (C:\Users\x\Desktop\hashcat-3.40\one rule.txt)
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 0 H/s (0.00ms)
Speed.Dev.#2.....: 0 H/s (0.00ms)
Speed.Dev.#*.....: 0 H/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 1/1 (100.00%)
Restore.Point....: 0/1 (0.00%)
Candidates.#1....: [Copying]
Candidates.#2....: [Copying]
HWMon.Dev.#1.....: Temp: 44c Fan: 33% Util: 0% Core: 65MHz Mem:4513MHz Lanes:16
HWMon.Dev.#2.....: Temp: 58c Fan: 55% Util:100% Core: 65MHz Mem:3802MHz Lanes:1

...

Any thoughts?


It's because hashcat skip input words < 8 for WPA_PSK, however, it shouldn't happen with rules. Surely it's a new bug.


Avatar
The_Mechanic

Status: Trusted
Joined: Sun, 07 Oct 2012
Posts: 401
Team:
Reputation: 651 Reputation
Offline
Sat, 11 Mar 2017 @ 21:26:18

jHi6az3HB said:


It's because hashcat skip input words < 8 for WPA_PSK, however, it shouldn't happen with rules. Surely it's a new bug.

No bug works as designed, rules are applied after the rejection of password candidates. Hashcat has always been this way far as i can remember.


Avatar
jHi6az3HB

Status: n/a
Joined: Fri, 24 Feb 2017
Posts: 9
Team:
Reputation: 0 Reputation
Offline
Sat, 11 Mar 2017 @ 22:06:27

The_Mechanic

WOW, I really don't knew that. Thanks!



9 Results - Page 1 of 1 -
1

We have a total of 202057 messages in 24900 topics.
We have a total of 22203 registered users.
Our newest registered member is shadowhz.