Need help cracking TrueCrypt from example page
#1
Version: hashcat-5.1.0 (Windows binary)

I have downloaded the file https://hashcat.net/misc/example_hashes/...serpent.tc

I created a dictionary that consists of 3 words

Code:
password
demo
hashcat

Then I run the command:

Code:
hashcat64 -a 0 -m 6221 hashcat_ripemd160_aes.tc demo.txt

And I get the output:

Code:
hashcat (v5.1.0) starting...

* Device #1: This hardware has outdated CUDA compute capability (3.5).
             For modern OpenCL performance, upgrade to hardware that supports
             CUDA compute capability version 5.0 (Maxwell) or higher.
* Device #1: WARNING! Kernel exec timeout is not disabled.
             This may cause "CL_OUT_OF_RESOURCES" or related errors.
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch
* Device #2: Not a native Intel OpenCL runtime. Expect massive speed loss.
             You can use --force to override, but do not report related errors.
nvmlDeviceGetCurrPcieLinkWidth(): Not Supported

nvmlDeviceGetClockInfo(): Not Supported

nvmlDeviceGetClockInfo(): Not Supported

nvmlDeviceGetTemperatureThreshold(): Not Supported

nvmlDeviceGetTemperatureThreshold(): Not Supported

nvmlDeviceGetUtilizationRates(): Not Supported

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 780 Ti, 768/3072 MB allocatable, 15MCU

OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #2: Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz, skipped.

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP
* Uses-64-Bit

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 64

Watchdog: Temperature abort trigger set to 90c

Dictionary cache hit:
* Filename..: demo.txt
* Passwords.: 3
* Bytes.....: 22
* Keyspace..: 3

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: TrueCrypt PBKDF2-HMAC-SHA512 + XTS 512 bit
Hash.Target......: hashcat_ripemd160_aes.tc
Time.Started.....: Tue Mar 26 14:40:47 2019 (1 sec)
Time.Estimated...: Tue Mar 26 14:40:48 2019 (0 secs)
Guess.Base.......: File (demo.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:        2 H/s (1.99ms) @ Accel:32 Loops:31 Thr:64 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 3/3 (100.00%)
Rejected.........: 0/3 (0.00%)
Restore.Point....: 3/3 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:992-999
Candidates.#1....: password -> hashcat
Hardware.Mon.#1..: Temp: 57c Fan: 37%

Started: Tue Mar 26 14:40:38 2019
Stopped: Tue Mar 26 14:40:49 2019

I expected to see hashcat found as the password, but I am not seeing this.

Can someone point me in the right direction on this?


Messages In This Thread
Need help cracking TrueCrypt from example page - by ec180303d4 - 03-27-2019, 12:00 AM