oclHashcat v1.31 Released
oclHashcat is a GPGPU-based multi-hash cracker using a brute-force attack (implemented as mask attack), combinator attack, dictionary attack, hybrid attack, mask attack, and rule-based attack.
This GPU cracker is a fusioned version of oclHashcat-plus and oclHashcat-lite.
GPU Driver requirements:
- NV users require ForceWare 331.67 or later
- AMD users require Catalyst 14.4 or later
Changelog v1.31
- Added support for AMD Catalyst 14.9
- Added support for NV CUDA 6.5
- Added support for NV new GPUs: “sm_52” (Maxwell v2), used in GTX 970/980
- Added new hash mode -m 12 = PostgreSQL
- Added new hash mode -m 123 = Django (SHA-1)
- Added new hash mode -m 501 = Juniper IVE
- Added new hash mode -m 4300 = md5(strtoupper(md5($pass)))
- Added new hash mode -m 3810 = md5($salt.$pass.$salt)
- Added new hash mode -m 9200 = Cisco $8$
- Added new hash mode -m 9300 = Cisco $9$
- Added new hash mode -m 9400 = Office 2007
- Added new hash mode -m 9500 = Office 2010
- Added new hash mode -m 9600 = Office 2013
- Added new hash mode -m 9700 = MS Office <= 2003 MD5 + RC4, oldoffice$0, oldoffice$1
- Added new hash mode -m 9710 = MS Office <= 2003 MD5 + RC4, collider-mode #1
- Added new hash mode -m 9720 = MS Office <= 2003 MD5 + RC4, collider-mode #2
- Added new hash mode -m 9800 = MS Office <= 2003 SHA1 + RC4, oldoffice$3, oldoffice$4
- Added new hash mode -m 9810 = MS Office <= 2003 SHA1 + RC4, collider-mode #1
- Added new hash mode -m 9820 = MS Office <= 2003 SHA1 + RC4, collider-mode #2
- Added new hash mode -m 9900 = Radmin2
- Added new hash mode -m 10000 = Django (PBKDF2-SHA256)
- Added new hash mode -m 10100 = SipHash
- New feature to notice the user how many hashes were removed because of pot file remove feature
- Output the MAC address (BSSID) too when cracking WPA/WPA2, pot file output is different too
- Renamed -m 8800 = Android FDE to -m 8800 Android FDE <= 4.3
- Removed docs/credits.txt
- Fixed problem with ADL fan speed information; only happening on some non-reference design Overdrive6 GPUs
- Fixed crash with –debug-mode=x when number of rules was exactly 14 (approaching maximum amount of rules allowed)
- Fixed inconsistency when using –show together with –username and different –outfile-format options
Full Changelog: here
Features
- Worlds fastest password cracker
- Worlds first and only GPGPU based rule engine
- Free
- Multi-GPU (up to 128 gpus)
- Multi-Hash (up to 100 million hashes)
- Multi-OS (Linux & Windows native binaries)
- Multi-Platform (OpenCL & CUDA support)
- Multi-Algo (see below)
- Low resource utilization, you can still watch movies or play games while cracking
- Focuses highly iterated modern hashes
- Focuses dictionary based attacks
- Supports distributed cracking
- Supports pause / resume while cracking
- Supports sessions
- Supports restore
- Supports reading words from file
- Supports reading words from stdin
- Supports hex-salt
- Supports hex-charset
- Built-in benchmarking system
- Integrated thermal watchdog
- 100+ Algorithms implemented with performance in mind
Attack-Modes
- Straight *
- Combination
- Brute-force
- Hybrid dict + mask
- Hybrid mask + dict
* accept Rules
Algorithms
- MD4
- MD5
- SHA1
- SHA-256
- SHA-512
- SHA-3 (Keccak)
- RipeMD160
- Whirlpool
- GOST R 34.11-94
- HMAC-MD5 (key = $pass)
- HMAC-MD5 (key = $salt)
- HMAC-SHA1 (key = $pass)
- HMAC-SHA1 (key = $salt)
- HMAC-SHA256 (key = $pass)
- HMAC-SHA256 (key = $salt)
- HMAC-SHA512 (key = $pass)
- HMAC-SHA512 (key = $salt)
- LM
- NTLM
- DCC
- DCC2
- NetNTLMv1
- NetNTLMv1 + ESS
- NetNTLMv2
- Kerberos 5 AS-REQ Pre-Auth etype 23
- AIX {smd5}
- AIX {ssha1}
- AIX {ssha256}
- AIX {ssha512}
- FreeBSD MD5
- OpenBSD Blowfish
- descrypt
- md5crypt
- bcrypt
- scrypt
- sha256crypt
- sha512crypt
- DES(Unix)
- MD5(Unix)
- SHA256(Unix)
- SHA512(Unix)
- OSX v10.4
- OSX v10.5
- OSX v10.6
- OSX v10.7
- OSX v10.8
- OSX v10.9
- Cisco-ASA
- Cisco-IOS
- Cisco $8$
- Cisco $9$
- Cisco-PIX
- GRUB 2
- Juniper Netscreen/SSG (ScreenOS)
- Juniper IVE
- RACF
- Android PIN
- Android FDE <= 4.3
- MSSQL
- MySQL
- Oracle
- PostgreSQL
- Sybase
- DNSSEC (NSEC3)
- IKE-PSK
- IPMI2 RAKP
- iSCSI CHAP
- WPA
- WPA2
- 1Password, cloudkeychain
- 1Password, agilekeychain
- Lastpass
- Password Safe v2
- Password Safe v3
- TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES
- TrueCrypt 5.0+ PBKDF2 HMAC-SHA512 + AES
- TrueCrypt 5.0+ PBKDF2 HMAC-Whirlpool + AES
- TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES + boot-mode
- TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES + hidden-volume
- TrueCrypt 5.0+ PBKDF2 HMAC-SHA512 + AES + hidden-volume
- TrueCrypt 5.0+ PBKDF2 HMAC-Whirlpool + AES + hidden-volume
- TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES + hidden-volume + boot-mode
- MS Office <= 2003 MD5 + RC4, oldoffice$0, oldoffice$1 + collider mode
- MS Office <= 2003 SHA1 + RC4, oldoffice$3, oldoffice$4 + collider mode
- MS Office 2007
- MS Office 2010
- MS Office 2013
- SAP CODVN B (BCODE)
- SAP CODVN F/G (PASSCODE)
- Lotus Notes/Domino 5
- Lotus Notes/Domino 6
- Lotus Notes/Domino 8
- PeopleSoft
- Citrix Netscaler
- Radmin2
- Netscape LDAP SHA/SSHA
- Apache MD5-APR
- Skype
- hMailServer
- EPiServer
- Drupal
- IPB
- Joomla
- MyBB
- osCommerce
- Redmine
- SMF
- vBulletin
- PHPS
- Mediawiki B type
- Woltlab Burning Board
- xt:Commerce
- WordPress
- phpBB3
- SipHash
- Django (SHA-1)
- Django (PBKDF2-SHA256)
- Half MD5 (left, mid, right)
- Double MD5
- Double SHA1
- md5($pass.$salt)
- md5($salt.$pass)
- md5(unicode($pass).$salt)
- md5($salt.unicode($pass))
- md5(sha1($pass))
- md5($salt.md5($pass))
- md5($salt.$pass.$salt)
- md5(strtoupper(md5($pass)))
- sha1($pass.$salt)
- sha1($salt.$pass)
- sha1(unicode($pass).$salt)
- sha1($salt.unicode($pass))
- sha1(md5($pass))
- sha256($pass.$salt)
- sha256($salt.$pass)
- sha256(unicode($pass).$salt)
- sha256($salt.unicode($pass))
- sha512($pass.$salt)
- sha512($salt.$pass)
- sha512(unicode($pass).$salt)
- sha512($salt.unicode($pass))
More Information: here
[button size=large style=round color=red align=none url=https://hashcat.net/oclhashcat]Download oclHashcat v1.31[/button]