The major change for v2.0 was moving everything from the main script and into separate files that would be sourced when called. The first version had some improvements in the time between releasing v2.0. With this script, efficiency and more effective cracking on a mobile GPU was more noticeable. To have a look at the code you can checkout the following commit: git clone With functions like checking requirements to run the script, light rules to have a go with, and also iterate the things I’ve cracked already. Also with this release, I included a bunch of example hashes in three different hashing formats, namely: With a few options already, I felt quite proud being able to do my first (public) release. ![]() Common substring (advise: first run steps above) Prefix suffix (advise: first run steps above)ġ0. The first release was one large file with 222 lines of code (without dependencies / add-ins). To get an idea about the performance of this GPU, I ran the benchmark within hashcat – it is available over here.Īfter playing around with hashcat on my CLI and being inefficient about it, I put my gathered knowledge into a simple bash script. This was all optimised to run quick, but effective jobs on a laptop with a dedicated GPU (NVIDIA M1200 Mobile at the time). The idea behind hash-cracker was, and still is, to be able to crack efficiently by putting gathered knowledge on password (re)use into a ‘simple’ script. After using this method for a while, I started looking into more attack modes and options within hashcat. The example above was my first try, this will work for cracking something like Summer2023!, if Summer is in the wordlist. Hashcat -m1000 nt_hashes -a6 wordlist '?d?d?d?d?d?d?s' Hashcat -m1000 nt_hashes -a6 wordlist '?d?d?d?d?d?s'
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |