• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Cracking hashcat v6.1.1 - advanced password recovery utility

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,456
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
hashcat.png


hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.

Features

  •         World’s fastest password cracker
  •         World’s first and only in-kernel rule engine
  •         Free
  •         Open-Source (MIT License)
  •         Multi-OS (Linux, Windows and macOS)
  •         Multi-Platform (CPU, GPU, DSP, FPGA, etc., everything that comes with an OpenCL runtime)
  •         Multi-Hash (Cracking multiple hashes at the same time)
  •         Multi-Devices (Utilizing multiple devices in same system)
  •         Multi-Device-Types (Utilizing mixed device types in same system)
  •         Supports password candidate brain functionality
  •         Supports distributed cracking networks (using overlay)
  •         Supports interactive pause / resume
  •         Supports sessions
  •         Supports restore
  •         Supports reading password candidates from file and stdin
  •         Supports hex-salt and hex-charset
  •         Supports automatic performance tuning
  •         Supports automatic keyspace ordering markov-chains
  •         Built-in benchmarking system
  •         Integrated thermal watchdog
  •         200+ Hash-types implemented with performance in mind
  •         … and much more

Changelog v6.1.1

This release is mostly about expanding support for new algorithms and fixing bugs:

    Added hash-mode: Apple Keychain
    Added hash-mode: XMPP SCRAM


Changelog fixed Bugs:

    Fixed integer overflow for large masks in -a 6 attack mode
    Fixed alias detection with additional processor core count check
    Fixed maximum password length in modules of hash-modes 600, 7800, 7801 and 9900
    Fixed non-zero status code when using –stdout
    Fixed uninitialized value in bitsliced DES kernel (BF mode only) leading to false negatives


Changelog Improvements:

    Compile ZLIB: Fixed makefile include paths in case USE_SYSTEM_ZLIB is used
    Compile macOS: Fixed makefile target ‘clean’ to correctly remove *.dSYM folders
    OpenCL Kernels: Added datatypes to literals of enum costants
    OpenCL Kernels: Added pure kernels for hash-mode 600 (BLAKE2b-512)
    OpenCL Runtime: Reinterpret return code CL_DEVICE_NOT_FOUND from clGetDeviceIDs() as non-fatal
    OpenCL Runtime: Add some unstable warnings for some SHA512 based algorithms on AMD GPU on macOS


Changelog Technical:

    Backend: Changed the maximum number of compute devices from 64 to 128
    Tests: Improved tests for hash-mode 11300 (Bitcoin/Litecoin wallet.dat)
    Tests: Improved tests for hash-mode 13200 (AxCrypt)
    Tests: Improved tests for hash-mode 13600 (WinZip)
    Tests: Improved tests for hash-mode 16400 (CRAM-MD5 Dovecot)
    Tests: Improved tests for hash-mode 16800 (WPA-PMKID-PBKDF2)


To see this hidden content, you must like this content.
 
Last edited by a moderator:
Status
Not open for further replies.
Back
Top