hashcat v6.2.0 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Announcements (https://hashcat.net/forum/forum-14.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-16.html) +--- Thread: hashcat v6.2.0 (/thread-10103.html) |
RE: hashcat v6.2.0 - oayz - 09-15-2021 What's need to be installed to support HIP? I'm getting this (under Windows 10): hashcat (v6.2.4) starting Unsupported AMD HIP runtime version '0.0.3224' detected! Falling back to OpenCL... OpenCL API (OpenCL 2.1 AMD-APP (3224.5)) - Platform #1 [Advanced Micro Devices, Inc.] ============================================================== * Device #1: AMD Radeon (TM) R9 200 Series, 1920/2048 MB (1523 MB allocatable), 20MCU Also HCCAPX which was working fine with 6.1.1 isn't working anymore: Hashfile 'example22000.hccapx' on line 1 (HCPX♦): Separator unmatched Hashfile 'example22000.hccapx' on line 2 (ATTApDyXXX): Separator unmatched Hashfile 'example22000.hccapx' on line 3 (): Separator unmatched No hashes loaded. Can I attach file? Thanks! RE: hashcat v6.2.0 - ZerBea - 09-15-2021 The old hash modes are deprecated and replaced by hash mode 22000. The new hash format is not longer binary (hccapx) and you don't need to take care whether the hash value is a PMKID or an EAPOL MESSAGE PAIR, any longer. The new hash mode is explained here: https://hashcat.net/forum/thread-10253.html That include examples. You can use hashcat online converter to get the hash values, hashcat can work on, from your pcapng/pcap/cap dump file here: https://hashcat.net/cap2hashcat/ RE: hashcat v6.2.0 - oayz - 09-22-2021 (09-15-2021, 12:28 PM)ZerBea Wrote: The old hash modes are deprecated and replaced by hash mode 22000. The new hash format is not longer binary (hccapx) and you don't need to take care whether the hash value is a PMKID or an EAPOL MESSAGE PAIR, any longer. Hey ZerBea, super-thanks! I still need to read the thread you've pointed to and compile tools (prefer online ones). Guess old hccapx files can't be converted to 22000 - no way to fake required by 22000 info, right? RE: hashcat v6.2.0 - ZerBea - 09-22-2021 hcxmactool will do this job: Code: $ hcxmactool --hccapxin=deprecated.hccapx --pmkideapolout=new.hc22000 And some other cnversions, too: Code: $ hcxmactool -h But I can't recommend it, the hccapx hash file doesn't contain useful information collected from WiFi traffic. It is much better to re-capture. Please notice that hcxmactool, hcxpmkidtool, hcxessidtool and hcxhashcattool are depracated, too. I'm going to remove this tools, when OpenSSL 3.0.0 arrived in Arch Linux package system: https://archlinux.org/packages/core/x86_64/openssl/ RE: hashcat v6.2.0 - oayz - 09-22-2021 Thank ZB, this is much more than I was hoping for. Your HCXTOOLS is a great addition to HASHCAT, thanks a lot for developing it "Better recapture" is well noted RE: hashcat v6.2.0 - ZerBea - 09-23-2021 Nice to hear that. BTW: hcxdumptool and hcxtools are a great addition to JtR, too. RE: hashcat v6.2.0 - oayz - 09-24-2021 ZB, your tools are swiss army knife for both HC and JTR, I've gladly discarded all others which I painstakingly collected from the web or wrote myself. One question: assuming I collect all HC22000 from multiple captures to the single file should I clean it up once in awhile leaving only latest with all required PMKID data? Or JTR/HC is smart enough to sort them out and use the best available? P.S. Sorry for high jacking the thread, probably need to move it somewhere RE: hashcat v6.2.0 - ZerBea - 09-25-2021 It is a good idea to collect all hashes to a single file. That is your hash database, that can be sorted unique and you can run small word lists on it. Findings can be removed directly by hashcat --remove option. If you want to run special tasks that depend on your target or reuse of PBKDF2 on common used ESSIDs (e.g. masks, basic word lists + rules, big word lists), you can use hcxhashtool on your database to get a "special target" hc22000 hash file hashcat can work on. RE: hashcat v6.2.0 - oayz - 09-26-2021 Mmm, may be I wasn't clear ... let's say I have collected 10 hashes from the same ESSID for period of time. I tried few attacks and didn't succeed. In next few months I added 10 more hashes from this EESID but old ones may be not valid anymore because pwd was changed. I also discovered new great attack and would like to try it out. What's the best strategy - keep only last one, keep few last ones or keep all? Of cause keep them all won't hurt, I'll get both passwords, old and new, but wouldn't it be 20x slower compare to keeping only last one? Oh, actually it may hurt because HC will stop processing hashes from this EEESID as soon as first (old!) pwd is found, right? RE: hashcat v6.2.0 - ZerBea - 09-26-2021 If the ESSID wasn't changed, the speed impact isn't so much. Hashcat will not stop unless all PSKs are tested against all hashes. To calculate the elapsed time, I used a small word list that doesn't contain matching PSKs. And I use Linux "time" to calculate the elapsed time and not(!) hashcat's internal calculation of elapsed time. Code: $ hcxhashtool -i test.22000 Less hashes: Code: $ hcxhashtool -i test20.22000 If the PSK was changed, you will possible get the history of PSK changes, when running against all hashes, e.g: PSK from M1M2ROGUE: password1234 Maybe we can assume the PSK could be password + digits! Old PSK from M2M3: password2018 Newer PSK from M2M3: password2019 Now we can assume the latest PSK could be password2021 because you recovered a complete history. BTW: To get full advantage of hashcat's reuse of PBKDF2: If you know the ESSID: Code: $ hcxhashtool -i hasharchive.22000 --essid=TARGET_ESSID -o test.22000 Or group all ESSIDs: Code: $ hcxhashtool -i hasharchive.22000 --essid-group |