How to run ntlm with brute-force in oclhashcat-plus

Source: Internet
Author: User

The latest oclHashcat-plus-0.07 documentation for this thing is too frustrating, so it's hard to find a valid, recorded
 
 
./CudaHashcat-plus32.bin-a 3-m 1000 hash? D? D? D? D? D? D? D? D? D? D? D? D-o log
1./cudaHashcat-plus32.bin-a 3-m 1000 hash? D? D? D? D? D? D? D? D? D? D? D? D-o log
 
Legacy problems:
1. What are the parameters for a specified character set, such as uppercase/lowercase letters, uppercase/lowercase letters, numbers, uppercase/lowercase letters, numbers, and shift numbers?
2. Specify the password length. For example, if I want to set the password length to less than 15 characters, what are the parameters? Oclhashcat seems to support up to 15-bit passwords.
3. Now ntlm's hash is only the hash part, and the account part does not know how to add it. I have converted it into a format like username: hash, and an error is returned. You need to know that oclhashcat supports the standard ntlm format.
Answer: The-username parameter can be added to support the username: hash format, but the output still does not contain username. There are two methods to achieve the output: username: cracked passwd format.
 
 
./CudaHashcat-plus32.bin hashfile.txt-m 1000-r rules/best64.rule example. dict -- username
$ Cut-d': '-f1 cracked.txt | xargs-I {}-xn1 grep {} hashfile.txt
In this example, hashfile.txt is username: hashformat, and cracked.txt is hash: plain format.
123. /cudaHashcat-plus32.bin hashfile.txt-m 1000-r rules/best64.rule example. dict -- username $ cut-d': '-f1 cracked.txt | xargs-I {}-xn1 grep {} hashfile.txt in which hashfile.txt is username: hashformat, and cracked.txt is hash: plain format.
 
Or use this PHP program to convert
 
 
<? Php
Echo ('combining FILES! ');
$ In1 = fopen ("emaihash.txt", "rb ");
$ In2 = fopen ("hashpass.txt", "rb ");
$ Out = fopen ("emailpass.txt", "wb"); // or emailhashpassword.txt
While ($ row = trim (fgets ($ in1 )))
{
List ($ email, $ hash) = preg_split ("~ :~ ", $ Row );
List (, $ pass) = preg_split ("~ :~ ", Trim (fgets ($ in2 )));
Fwrite ($ out, $ email. ":". $ pass. "\ r \ n"); // or fwrite ($ out, $ email. ":". $ hash. ":". $ pass. "\ r \ n ");
}
Fclose ($ in1 );
Fclose ($ in2 );
Fclose ($ out );
?>
123456789101112131415 <? Php echo ('combining FILES! '); $ In1 = fopen ("emaihash.txt", "rb"); $ in2 = fopen ("hashpass.txt", "rb"); $ out = fopen ("emailpass.txt ", "wb"); // or emailhashpassword.txt while ($ row = trim (fgets ($ in1) {list ($ email, $ hash) = preg_split ("~ :~ ", $ Row); list (, $ pass) = preg_split ("~ :~ ", Trim (fgets ($ in2); fwrite ($ out, $ email. ":". $ pass. "\ r \ n"); // or fwrite ($ out, $ email. ":". $ hash. ":". $ pass. "\ r \ n");} fclose ($ in1); fclose ($ in2); fclose ($ out);?>
 
4. GPU is useless when running NTLM! This is the biggest problem! I suspect that it is not the brute-force mode, but the mask mode. But it is also strange that the CPU only uses 23%.
 
 
Pid user pr ni virt res shr s % CPU % mem time + COMMAND
13471 root 15 0 136 m 81 m 31 m S 23.3. 09 cudaHashcat-plu
12 pid user pr ni virt res shr s % CPU % mem time + COMMAND 13471 root 15 0 136 m 81 m 31 m S 23.3 2.8. 09 cudaHashcat-plu
 
Status ......: Running
Input. Mode...: Mask (? D? D? D? D? D? D? D? D? D? D? D? D)
Hash. Type...: NTLM
Time. Running.: 5 secs
Time. Left...: 8 mins, 17 secs
Time. Util...: 5592.7 ms/250.5 ms Real/CPU, 4.7% idle
Speed ......: 1988.5 M c/s Real, 2106.8 M c/s GPU
Recovered...: 0/850 Digests, 0/1 Salts
Progress...: 11120836608/1000000000000 (1.11%)
Rejected...: 0/11120836608 (0.00%)
HW. Monitor. #1: 0% GPU, 39c Temp
HW. Monitor. #2: 0% GPU, 39c Temp
HW. Monitor. #3: 0% GPU, 32c Temp
[S] tatus [p] ause [r] esume [q] uit =>

From subaozi

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.