oclHashcat v1.31
#1


Download here: https://hashcat.net/oclhashcat/



oclHashcat v1.31 is the first oclHashcat version that fully supports the new Maxwell v2 GPUs from NVidia (GTX 970/980). There are a lot of request coming in about oclHashcat support for those cards as they are kind of special. If you want to know more about that, please read this:
Therefore we decided to release the 1.31 version a bit sooner as the usual update frequency.



We spend a lot of time (as always) in finding new optimizations and performance gains and it seems that it was worth the effort, see for instance the direct comparison of v1.20 and v1.31 for NVidia GTX Titan: http://hashcat.net/forum/thread-3707.html

Furthermore, we've added support and optimized the kernels for AMD Catalyst 14.9 and NV ForceWare 343.22. Therefore it is required that you use that specific version of catalyst or ForceWare together with oclHashcat 1.31.



New Algorithms:
  • Office 2003 / 2007 / 2010 / 2013 documents
  • Cisco $8$ (PBKDF2-SHA256) and $9$ (scrypt)
  • Juniper IVE
  • SipHash
  • Django (PBKDF2-SHA256)
  • RAdmin2
  • md5($salt.$pass.$salt)
  • md5(strtoupper(md5($pass)))

We think the addition of Office 97/2003 algorithm is the most interesting one, at least from a forensics and pentesters perspective. For this hash-type, there's two ways (and hash types) to crack Office 97/2003 documents. That is either by searching for all collisions (see -m 9710/9720 and -m 9810/9820) or with the -m 9700/9800 "conventional" method. oclHashcat 1.31 supports all Office document types. For example it is not limited to doc/docx, it will work also on Microsoft Excel .xmlx, .pptx files etc.

The new -m 9720 and -m 9820 mode will help you to find all "passwords" and they do not stop after the first crack. That's important if you want to know "all" matching passwords in case you're looking for a password you can use to test for password re-use. For more details about the addition of Office 97/2003 see http://hashcat.net/forum/thread-3665.html



As far as we know, oclHashcat is the first cracker to support cracking of the new Cisco hashing schemes (PBKDF2-SHA256 and scrypt) and the Juniper IVE hashes.



Full changelog v1.30 -> v1.31

Quote:
Type: Driver
File: Host
Desc: added support for AMD Catalyst 14.9

Type: Driver
File: Host
Desc: added support for NV CUDA 6.5

Type: Driver
File: Kernel
Desc: Added support for NV new GPUs: "sm_52" (Maxwell v2), used in GTX 970/980

Type: Feature
File: Kernel
Desc: added new hash mode -m 12 = PostgreSQL

Type: Feature
File: Kernel
Desc: added new hash mode -m 123 = Django (SHA-1)

Type: Feature
File: Kernel
Desc: added new hash mode -m 501 = Juniper IVE

Type: Feature
File: Kernel
Desc: added new hash mode -m 4300 = md5(strtoupper(md5($pass)))

Type: Feature
File: Kernel
Desc: added new hash mode -m 3810 = md5($salt.$pass.$salt)

Type: Feature
File: Kernel
Desc: added new hash mode -m 9200 = Cisco $8$

Type: Feature
File: Kernel
Desc: added new hash mode -m 9300 = Cisco $9$

Type: Feature
File: Kernel
Desc: added new hash mode -m 9400 = Office 2007

Type: Feature
File: Kernel
Desc: added new hash mode -m 9500 = Office 2010

Type: Feature
File: Kernel
Desc: added new hash mode -m 9600 = Office 2013

Type: Feature
File: Kernel
Desc: added new hash mode -m 9700 = MS Office <= 2003 MD5 + RC4, oldoffice$0, oldoffice$1

Type: Feature
File: Kernel
Desc: added new hash mode -m 9710 = MS Office <= 2003 MD5 + RC4, collider-mode #1

Type: Feature
File: Kernel
Desc: added new hash mode -m 9720 = MS Office <= 2003 MD5 + RC4, collider-mode #2

Type: Feature
File: Kernel
Desc: added new hash mode -m 9800 = MS Office <= 2003 SHA1 + RC4, oldoffice$3, oldoffice$4

Type: Feature
File: Kernel
Desc: added new hash mode -m 9810 = MS Office <= 2003 SHA1 + RC4, collider-mode #1

Type: Feature
File: Kernel
Desc: added new hash mode -m 9820 = MS Office <= 2003 SHA1 + RC4, collider-mode #2

Type: Feature
File: Kernel
Desc: added new hash mode -m 9900 = Radmin2

Type: Feature
File: Kernel
Desc: added new hash mode -m 10000 = Django (PBKDF2-SHA256)
Trac: #473

Type: Feature
File: Kernel
Desc: added new hash mode -m 10100 = SipHash
Trac: #509

Type: Feature
File: Host
Desc: new feature to notice the user how many hashes were removed because of pot file remove feature
Trac: #506

Type: Feature
File: Host
Desc: output the MAC address (BSSID) too when cracking WPA/WPA2, pot file output is different too
Trac: #440

Type: Change
File: Host
Desc: Renamed -m 8800 = Android FDE to -m 8800 Android FDE <= 4.3

Type: Change
File: Docs
Desc: Removed docs/credits.txt

Type: Bug
File: Host
Desc: fixed problem with ADL fan speed information; only happening on some non-reference design Overdrive6 GPUs
Trac: #498

Type: Bug
File: Host
Desc: fixed crash with --debug-mode=x when number of rules was exactly 14 (approaching maximum amount of rules allowed)
Trac: #505

Type: Bug
File: Host
Desc: fixed inconsistency when using --show together with --username and different --outfile-format options
Trac: #513
#2
What do we need to extract from Office 2007 / 2010 documents to use oclHashcat 1.31?

And similar instructions for Office 2003 would be appreciated, too.
#3
(10-02-2014, 09:40 PM)Kgx Pnqvhm Wrote: What do we need to extract from Office 2007 / 2010 documents to use oclHashcat 1.31?

And similar instructions for Office 2003 would be appreciated, too.

something like office2john.py
#4
Thank you!
This update resolved "WARN: Failed to get ADL Target Tempature Data" for my R9 290x.
#5
Awesome - as usual !!
Many thanks for your efforts Smile
#6
Where i can download the update, still 1.30?
#7
Thank you very much for all your hard work and another great release of oclhashcat !

It's always a special day when there is a new version of oclhashcat for us to download Smile
#8
This is great thanks Smile
#9
what about oclhashcat implementation of pdf, rar, 7z, lotus file cracking? extract tools are possible to download from https://github.com/magnumripper/JohnTheRipper/

(it is the same like ms office cracking. isn't it?)
#10
(11-05-2014, 03:20 PM)bitguard Wrote: what about oclhashcat implementation of pdf, rar, 7z, lotus file cracking? extract tools are possible to download from https://github.com/magnumripper/JohnTheRipper/

(it is the same like ms office cracking. isn't it?)

Nope, they are different