oclHashcat-plus v0.07 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Announcements (https://hashcat.net/forum/forum-19.html) +--- Thread: oclHashcat-plus v0.07 (/thread-761.html) |
oclHashcat-plus v0.07 - atom - 12-31-2011 Hello Hashcat-Community, I am proud to present you the latest oclHashcat-plus v0.07 release. As you might already know, porting features from regular oclHashcat to oclHashcat-plus was my biggest goal for this release. But there are also:
This new oclHashcat-plus v0.07 is the result of all these changes. The following features that have been ported from regular oclHashcat v0.26 to oclHashcat-plus v0.07: These Attack-modes made regular oclHashcat unique. Since they have been ported to oclHashcat-plus I can finally officially deprecate regular oclHashcat. Running an Brute-Force attack and Mask attack was already possible with oclHashcat-plus v0.06 but you had to pipe the data from maskprocessor into oclHashcat-plus. It was getting more complicated If you wanted to attack so called "fast algorithms" like MD5. you had to split and generate rules to run them efficient. To be exact, the Brute-Force attack and Mask attack kernels are not-reversed versions from oclHashcat-lite v0.08. This version is specialized on doing Brute-Force and Mask attacks. For those using regular oclHashcat for Brute-Force and do not know the difference to oclHashcat-lite: There is no more thing called right- and left-side of the mask. The new oclHashcat-plus automatically calculates the most efficient split. This will hopefully make it easier especially for the new users. The next feature, or let me say killer feature, is what I call "multirules". To explain it I made a special forum post with some examples and details here: http://hashcat.net/forum/thread-703.html Especially when you think of creating own rules this will totally boost your creativity. To get started I also added some example rules which i called hybrid rules. They can be found in rules/hybrid/. When you start playing with multirules you will shortly notice how to use the hybrid rules and why they have been added. Then there was this nice request: http://hashcat.net/forum/thread-437.html Basically it says: If you are a pentester and you use oclHashcat-plus on the hashes of your customer you might have some restrictive policies on how to handle the cracked hashes. This new requested feature tells oclHashcat-plus to NOT show the cracked plaintext. It will show only the cracked hash. That might be enough for you to build statistics or to inform users to change their passwords. So, if you are interessted in this, check the new --outfile-format parameters. Then there are new Kernels. Some of them have been heavily requested.
You know, oclHashcat-plus does not have generic Kernels like md5($salt.$pass) or md5($pass.$salt). But if you take a close look at what is behind the new kernels and with a bit of knowledge in hashcracking you might be able to exploit these kernels Another important thing to notice is that i have renamed some of the hash-types. For example, Vbull which was -m 5 is now -m 2611. There is a full list of the renamed kernels in the Changelog below. The reason for this that i put in some system into the numbers. A nice bugfix to mention is that you can now use commandline file-globbing on windows again. For example, you can now use *.dict to tell oclHashcat-plus that it should use all files matching *.dict as your wordlists in a sequence. This was changed somehow in a previous mingw release and i did not notice this change so it was not useable even it was already supported. CUDA 4.1 dropped in unexpected. OK, its still just an RC but I really have to say: WOW! They claim a speed increase of 10% on their presentation. And its true, the llvm compiler (which was added) create some neat optimizations in the kernels. But to make use of them, I have to change all the datatypes used in the kernels to vector datatypes. Otherwise they produce slower code than CUDA 4.0. So thats why I stick to CUDA 4.0 for this release. In a later release I will switch to vector datatypes and then to CUDA 4.1. AMD was not lazy, too. The new AMD APP SDK v2.6 include support for the upcomming hd7xxx series. So what I did is that i blindly generated the Kernels for all hd7xxx and added them to this release. Well this is only theory. We will see how it works out. These new kernels are called "Capeverde", "Pitcairn" and "Tahiti". Last but not least here is the Full changelog v0.06 -> v0.07: Code: type: speedups RE: oclHashcat-plus v0.07 - Hash-IT - 12-31-2011 Hey atom ! You are awesome, hashcatplus is awesome....everything is awesome !! Thank you very much for all your hard work and I really do hope you have a great new year ! RE: oclHashcat-plus v0.07 - K9 - 12-31-2011 good job <3 RE: oclHashcat-plus v0.07 - ati6990 - 12-31-2011 again perfect work, i was looking forward to the multi rule attack , test it soon. RE: oclHashcat-plus v0.07 - Legitnick - 01-01-2012 Thank you! I'll be making a comprehensive tutorial on cracking WPA/WPA2 handshakes with multirules/bruteforce. RE: oclHashcat-plus v0.07 - raxon1s - 01-01-2012 Very Good Job atom!! Really Impressed. All these changes are so usefull!!! Keep up the good work atom! Happy new year to all RE: oclHashcat-plus v0.07 - Null Set - 01-01-2012 Great work with this one. Seems easier to use than before 'coz you don't need left and right masks. Thanks! RE: oclHashcat-plus v0.07 - corerj - 01-04-2012 good job! RE: oclHashcat-plus v0.07 - nobody - 01-04-2012 Using plus to replace old oclhashcat is a good idea! |