Poll: Next algorithms
This poll is closed.
WoltLab BB3
2.06%
5 2.06%
Lotus HTTP Hash
2.06%
5 2.06%
Reduced MD5
1.23%
3 1.23%
MSCHAP
5.35%
13 5.35%
SAP
1.23%
3 1.23%
Blowfish(UNIX), aka $2a$
9.05%
22 9.05%
sha512(UNIX), aka $6$
11.11%
27 11.11%
SHA512($pass.$salt)
4.94%
12 4.94%
md5(md5($pass).$pass)
4.53%
11 4.53%
md5($pass.md5($pass))
3.70%
9 3.70%
SHA1($salt.$pass)
6.17%
15 6.17%
MD5($pass.$salt)
8.64%
21 8.64%
SHA256($pass.$salt)
4.94%
12 4.94%
MD5($salt.$pass)
7.00%
17 7.00%
WEP
5.76%
14 5.76%
HMAC-MD5
1.23%
3 1.23%
TrueCrypt (SHA512 only)
13.99%
34 13.99%
PasswordsSafe
1.65%
4 1.65%
IKE Preshared Key
5.35%
13 5.35%
Total 243 vote(s) 100%
* You voted for this item. [Show Results]

oclHashcat-plus v0.09 Poll 3/3: Next algorithms
#1
Brick 
You can select multiple options.

More details can be found on the corresponding threads:
Reply
#2
I voted for:

SHA-512(unix) aka butthurt algorithm.
Would be useful for benchmarking, as it's the slowest algo on the planet.

WEP, because cracking it in a minute with 100k+ data packets isn't fast enough.
Do want a GPU-aware WEP bruteforcer(not a PTW-based attack, that would be too much work).

TrueCrypt, since you never know what will appear on the next CMIYK.
Reply
#3
Nice to see you are continuing to relentlessly expand hashcats abilities atom !

I voted for TrueCrypt and PasswordsSafe out of the selection above. I was surprised to see you considering TrueCrypt as you had previously rejected it in my feature request list. I am really pleased and grateful you are always open to review previous requests.

I would also like to re-request the other previously rejected requests. Office, RAR and Zip would be fantastic.

If you are looking to expand hashcats capabilities can I suggest that you consider the password length again ? Support for longer passwords is almost a must especially when you are considering taking on TrueCrypt etc. Users of such programs will not be as lazy as normal users who make passwords to simply log in and they are more likely to use better, longer passwords than less security aware users.

The longer password length would be a huge bonus to all algorithms, especially when considering simple password padding can push the humblest of passwords beyond hashcats reach….”administrator123” for example.

Thank you for your constant work on hashcat, I hope to get time to load a win 7 machine so I can help test again soon.
Reply
#4
TrueCrypt!!

[Image: truecrypt-21.jpg]
Reply
#5
Updated the TrueCrypt selection. Only SHA512 will be supported. Not RIPEMD, not Whirlpool!
Reply
#6
I voted for Lotus Notes HTTP password. This is a very common in the enterprise level.
Reply
#7
TrueCrypt would be nice, but I agree with Hash-IT...I'd like support for rar, pdf, zip, and/or Office files.
Reply
#8
+1 for Archive rar zip and Office stuff.
Reply
#9
+1 for archive (rar, zip, pdf, etc)
Reply
#10
truecrypt and sha512 seem to be the most useful out of that list, but I agree with the previous posts in that I would like to see archives more! Smile
Reply