hashcat Forum

Full Version: Just want to confirm it doesn't support
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi there,

I just want to confirm, does oclhashcat-plus NOT support IPB 3+ and their hashes? I'd love to play with it, but I just wanted to confirm that it doesn't.

Thanks
dunno. can you post an example hash + salt + plaintext pls?
Just a FYI, the reason I was asking was because I see that oclhashcat-plus is compatible with IPB 2, but not IPB 3, so that was my main reason for asking.

Here is a sample, I just created an account.

Hash - "419fca337ab3a4f27cca7448451846f4"
Salt - "8,VRs"
Plaintext - "testpassword"

The values are inside the double quotes. The double quotes are NOT part of the hash, salt, or plaintext.

Hope that help, and thanks for the answer.

If it helps, I think (according to a quick google search) that the algorithm for IPB 3 is

md5(md5($salt).md5($password))



Well, according to someone else's post online, they say this is the same method as IPB 2. Can you confirm atom?
you are lucky. both hashcat cpu and hashcat-plus as well support this algorithm. the new -lite also support it in beta, which is not yet released. in plus, its the algorithm type 2811.

Quote:root@sf:~/oclHashcat-plus-0.08# cat > hash
419fca337ab3a4f27cca7448451846f4:8,VRs
root@sf:~/oclHashcat-plus-0.08# echo testpassword | ./oclHashcat-plus64.bin -m 2811 hash
oclHashcat-plus v0.08 by atom starting...

Hashes: 1
Unique salts: 1
Unique digests: 1
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rules: 1
GPU-Loops: 32
GPU-Accel: 40
Password lengths range: 1 - 15
Platform: AMD compatible platform found
Watchdog: Temperature limit set to 90c
Device #1: Cypress, 1024MB, 0Mhz, 20MCU
Device #2: Cypress, 1024MB, 0Mhz, 20MCU
Device #1: Allocating 120MB host-memory
Device #1: Kernel ./kernels/4098/m2810_a0.Cypress.64.kernel (999756 bytes)
Device #2: Allocating 120MB host-memory
Device #2: Kernel ./kernels/4098/m2810_a0.Cypress.64.kernel (999756 bytes)

Starting attack in wordlist stdin mode...

419fca337ab3a4f27cca7448451846f4:8,VRs:testpassword

Status.......: Cracked
Input.Mode...: Piped
Hash.Target..: Hash (419fca337ab3a4f27cca7448451846f4:8,VRs)
Hash.Type....: IPB2, MyBB1.2
Time.Running.: 1 sec
Time.Util....: 1000.7ms/0.0ms Real/CPU, 0.0% idle
Speed........: 1 c/s Real, 0 c/s GPU
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 1
Rejected.....: 0
HW.Monitor.#1: 0% GPU, 39c Temp
HW.Monitor.#2: 0% GPU, 36c Temp

Started: Thu Jan 19 21:17:59 2012
Stopped: Thu Jan 19 21:18:01 2012
Interesting, well that might be worth updating to the description of the tools that you support IPB 2 and IPB 3.

Thanks for the confirmation
I added to the wiki under "Supported algorithms and GPU defaults," but not to the wiki copy of --help output, since it isn't actually in the help output at this time.
ok good info, thanks