Long base passwords - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-lite Support (https://hashcat.net/forum/forum-22.html) +--- Thread: Long base passwords (/thread-1726.html) |
Long base passwords - pragmatic - 11-04-2012 Hello all, I'm having some trouble cracking some passwords that have a long static base string followed by unknown characters. For instance a password scheme like: ThisPartIsAlwaysTheSame ThisPartIsAlwaysTheSame1 ThisPartIsAlwaysTheSame! ThisPartIsAlwaysTheSame1234 ThisPartIsAlwaysTheSame123456 ThisPartIsAlwaysTheSame1@E$56 ThisPartIsAlwaysTheSameVanessa I'm invoking as follows (this run's hash is ThisPartIsAlwaysTheSame1234): C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 C88C5A5162DE00A89E78A6265C4C0AAB ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40 oclHashcat-lite v0.10 by atom starting... Password lengths range: 23 - 40 Watchdog: Temperature abort trigger set to 90c Watchdog: Temperature retain trigger set to 80c Device #1: Cayman, 2048MB, 880Mhz, 24MCU Device #2: Cayman, 2048MB, 880Mhz, 24MCU c88c5a5162de00a89e78a6265c4c0aab:ThisPartIsAlwaysTheSame1234 Status.......: Cracked Hash.Target..: c88c5a5162de00a89e78a6265c4c0aab Hash.Type....: NTLM Time.Running.: 0 secs Time.Left....: 0 secs Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a Plain.Text...: **isPartIsAlwaysTheSame4\\4 Plain.Length.: 27 Progress.....: 17694720/81450625 (21.72%) Speed.GPU.#1.: 117.0M/s Speed.GPU.#2.: 117.4M/s Speed.GPU.#*.: 234.4M/s HWMon.GPU.#1.: 0% Util, 69c Temp, 32% Fan HWMon.GPU.#2.: 0% Util, 69c Temp, 32% Fan Started: Sat Nov 03 16:39:51 2012 Stopped: Sat Nov 03 16:39:53 2012 This works great until I get over a password length of 27, at which point it seems to truncate what I've asked for. Invoking with hash for ThisPartIsAlwaysTheSame123456: C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 2056CE87BA07FD7F40A5A5C49A1A5873 ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40 oclHashcat-lite v0.10 by atom starting... Password lengths range: 23 - 40 Watchdog: Temperature abort trigger set to 90c Watchdog: Temperature retain trigger set to 80c Device #1: Cayman, 2048MB, 880Mhz, 24MCU Device #2: Cayman, 2048MB, 880Mhz, 24MCU [s]tatus [p]ause [r]esume [q]uit => Status.......: Exhausted Hash.Target..: 2056ce87ba07fd7f40a5a5c49a1a5873 Hash.Type....: NTLM Time.Running.: 0 secs Time.Left....: 0 secs Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a Plain.Text...: **isPartIsAlwaysTheSame Plain.Length.: 27 Progress.....: 81450625/81450625 (100.00%) Speed.GPU.#1.: 117.7M/s Speed.GPU.#2.: 118.8M/s Speed.GPU.#*.: 236.5M/s HWMon.GPU.#1.: 0% Util, 70c Temp, 32% Fan HWMon.GPU.#2.: 0% Util, 70c Temp, 32% Fan Started: Sat Nov 03 16:43:16 2012 Stopped: Sat Nov 03 16:43:18 2012 It gives up at ThisPartIsAlwaysTheSame?a?a?a?a without processing the full mask specified. Do I need a specific switch to get it to go beyond a length of 27, or is there a bug here? RE: Long base passwords - epixoip - 11-04-2012 most ntlm implementations only implement one block of md4, which limits the key to 27 characters. while i'm sure atom's implementation differs from this, you can see an example of this algorithm at http://openwall.info/wiki/john/NTLM RE: Long base passwords - pragmatic - 11-04-2012 Very interesting, and as it turns out there is a wiki page that calls this out specifically: http://hashcat.net/wiki/doku.php?id=oclhashcat_lite PHP Code: Hash-Type min length max length Does windows itself share this limitation or is it just a common simplification among other implementations? Obviously I can test I just figured someone might know offhand. RE: Long base passwords - epixoip - 11-04-2012 Windows doesn't share this implementation, no. This implementation is oriented toward performance. You can get more performance if you make certain assumptions, like e.g. the password is less than 28 chars. RE: Long base passwords - atom - 11-05-2012 The technical reason behind is that NTLM is unicode version of MD4. After the convert, each input doubles in size. For example the word "password" becomes the size 16. A single MD4 transformation is limited to the size 64 (block) - 8 (64 bit length) - 1 (stopbit) = 55. Now this explains why you can have only 27 chars in NTLM -> 27 * 2 = 54. but 28 * 2 = 56 which is to long. RE: Long base passwords - pragmatic - 11-05-2012 Gotcha, this would push it into the next block which requires another transform while keeping internal state, etc. At least in a situation where a lot of the guesses are in the second block you could compute the first block once and save yourself from having to do it again for the rest of the guesses using that first block. That said I can imagine that putting in the code to handle multiple blocks in the first place could slow down what must be by far the most common case of correctly assuming one block. RE: Long base passwords - atom - 11-05-2012 That is right but it requires the password (including salt) is at least of size 64. RE: Long base passwords - pragmatic - 11-21-2012 One more question on max lengths... For oclhashcat-lite there is that great table that shows all the max lengths on its wiki page. For oclhashcat-plus the wiki states that all algorithms are capped at 15. The hashcat wiki on the other hand does not mention any cap and the "Limitations" section says "None." However, by experimentation it is clear there are length caps on hashcat as well. Would it be possible to update the hashcat wiki with a max length table like the one in the oclhashcat-lite page? These variations in length support without documentation can lead to confusion. I understand there are good reasons for these limitations as the above thread discussed, but I think it would be valuable to document them. A few I've noticed: NTLM 27 MD5 55 md5crack 15 RE: Long base passwords - atom - 11-22-2012 Sounds reasonable. Anyone from the wiki maintainers, please copy, the table from oclHashcat and adjust using the following maximum lengths: Code: #define PLAIN_SIZE_MD5 55 |