Skip to content

Instantly share code, notes, and snippets.

@githubkuyaya
Created Nov 18, 2021
Embed
What would you like to do?
PS C:\hashcat-6.2.4\hashcat-6.2.4> ./hashcat.exe -a 3 -m 1000 .\hashes.txt ?a?a?a?a?a?a?a?a
hashcat (v6.2.4) starting
CUDA API (CUDA 11.5)
====================
* Device #1: NVIDIA GeForce GTX 1070, 7243/8191 MB, 15MCU
OpenCL API (OpenCL 3.0 CUDA 11.5.76) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #2: NVIDIA GeForce GTX 1070, skipped
OpenCL API (OpenCL 3.0 WINDOWS) - Platform #2 [Intel(R) Corporation]
====================================================================
* Device #3: Intel(R) Core(TM) i7-8700 CPU @ 3.20GHz, skipped
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 2947 MB
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>
Session..........: hashcat
Status...........: Running
Hash.Mode........: 1000 (NTLM)
Hash.Target......: REDACTED
Time.Started.....: Thu Nov 18 21:39:45 2021 (2 secs)
Time.Estimated...: Sat Nov 27 16:43:20 2021 (8 days, 19 hours)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: ?a?a?a?a?a?a?a?a [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 8731.3 MH/s (6.36ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 22271754240/6634204312890625 (0.00%)
Rejected.........: 0/22271754240 (0.00%)
Restore.Point....: 0/7737809375 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:45312-45440 Iteration:0-128
Candidate.Engine.: Device Generator
Candidates.#1....: |16erane -> yul^Igin
Hardware.Mon.#1..: Temp: 61c Fan: 60% Util: 90% Core:1835MHz Mem:3802MHz Bus:16
Cracking performance lower than expected?
* Append -O to the commandline.
This lowers the maximum supported password/salt length (usually down to 32).
* Append -w 3 to the commandline.
This can cause your screen to lag.
* Append -S to the commandline.
This has a drastic speed impact but can be better for specific attacks.
Typical scenarios are a small wordlist but a large ruleset.
* Update your backend API runtime / driver the right way:
https://hashcat.net/faq/wrongdriver
* Create more work items to make use of your parallelization power:
https://hashcat.net/faq/morework
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>
Session..........: hashcat
Status...........: Quit
Hash.Mode........: 1000 (NTLM)
Hash.Target......: REDACTED
Time.Started.....: Thu Nov 18 21:39:45 2021 (20 secs)
Time.Estimated...: Sat Nov 27 13:59:01 2021 (8 days, 16 hours)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: ?a?a?a?a?a?a?a?a [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 8846.1 MH/s (6.30ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 177356144640/6634204312890625 (0.00%)
Rejected.........: 0/177356144640 (0.00%)
Restore.Point....: 0/7737809375 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:360832-360960 Iteration:0-128
Candidate.Engine.: Device Generator
Candidates.#1....: 3{'erane -> W~P^Igin
Hardware.Mon.#1..: Temp: 66c Fan: 67% Util: 89% Core:1816MHz Mem:3802MHz Bus:16
Started: Thu Nov 18 21:39:43 2021
Stopped: Thu Nov 18 21:40:06 2021
PS C:\hashcat-6.2.4\hashcat-6.2.4>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment