Skip to content

Instantly share code, notes, and snippets.

@githubkuyaya
Created November 18, 2021 20:32
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save githubkuyaya/f85aa36f2aa6422a02b43a7266159621 to your computer and use it in GitHub Desktop.
Save githubkuyaya/f85aa36f2aa6422a02b43a7266159621 to your computer and use it in GitHub Desktop.
PS C:\hashcat-6.2.4\hashcat-6.2.4> ./hashcat.exe -a 0 -m 1000 .\hashes.txt .\rockyou.txt -r .\rules\dive.rule
hashcat (v6.2.4) starting
CUDA API (CUDA 11.5)
====================
* Device #1: NVIDIA GeForce GTX 1070, 7243/8191 MB, 15MCU
OpenCL API (OpenCL 3.0 CUDA 11.5.76) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #2: NVIDIA GeForce GTX 1070, skipped
OpenCL API (OpenCL 3.0 WINDOWS) - Platform #2 [Intel(R) Corporation]
====================================================================
* Device #3: Intel(R) Core(TM) i7-8700 CPU @ 3.20GHz, skipped
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 99086
Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 263 MB
Dictionary cache hit:
* Filename..: .\rockyou.txt
* Passwords.: 14344396
* Bytes.....: 139921601
* Keyspace..: 1421328822056
Cracking performance lower than expected?
* Append -O to the commandline.
This lowers the maximum supported password/salt length (usually down to 32).
* Append -w 3 to the commandline.
This can cause your screen to lag.
* Append -S to the commandline.
This has a drastic speed impact but can be better for specific attacks.
Typical scenarios are a small wordlist but a large ruleset.
* Update your backend API runtime / driver the right way:
https://hashcat.net/faq/wrongdriver
* Create more work items to make use of your parallelization power:
https://hashcat.net/faq/morework
(REDACTED_CRACK)
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 1000 (NTLM)
Hash.Target......: REDACTED
Time.Started.....: Thu Nov 18 21:27:53 2021 (38 secs)
Time.Estimated...: Thu Nov 18 21:28:31 2021 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (.\rockyou.txt)
Guess.Mod........: Rules (.\rules\dive.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 927.3 MH/s (7.91ms) @ Accel:64 Loops:128 Thr:64 Vec:1
Recovered........: 1/1 (100.00%) Digests
Progress.........: 36566384640/1421328822056 (2.57%)
Rejected.........: 0/36566384640 (0.00%)
Restore.Point....: 368640/14344396 (2.57%)
Restore.Sub.#1...: Salt:0 Amplifier:512-640 Iteration:0-128
Candidate.Engine.: Device Generator
Candidates.#1....: Rootbeer -> brand*y
Hardware.Mon.#1..: Temp: 58c Fan: 58% Util: 77% Core:1848MHz Mem:3802MHz Bus:16
Started: Thu Nov 18 21:27:52 2021
Stopped: Thu Nov 18 21:28:33 2021
PS C:\hashcat-6.2.4\hashcat-6.2.4>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment