<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - Very old oclHashcat-plus Announcements]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Thu, 16 Apr 2026 00:47:03 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[[split] oclHashcat-plus v0.15]]></title>
			<link>https://hashcat.net/forum/thread-2713.html</link>
			<pubDate>Mon, 14 Oct 2013 12:26:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=3908">Immy</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2713.html</guid>
			<description><![CDATA[I am very satisfied this feature: <br />
<span style="font-weight: bold;" class="mycode_b">Directories containing dictionaries</span><br />
"You already know that with straight mode, you can specify a directory directly on the command line, and hashcat will loop through all of the dictionaries in that directory automatically."<br />
<br />
<br />
I would like to same with the rules. (--attack-mode 1)<br />
I relly admire, if I can specify a directory directly on the command line, and hashcat will loop through all of the <span style="text-decoration: underline;" class="mycode_u">rules </span>in that directory automatically.<br />
<br />
Could you help me?]]></description>
			<content:encoded><![CDATA[I am very satisfied this feature: <br />
<span style="font-weight: bold;" class="mycode_b">Directories containing dictionaries</span><br />
"You already know that with straight mode, you can specify a directory directly on the command line, and hashcat will loop through all of the dictionaries in that directory automatically."<br />
<br />
<br />
I would like to same with the rules. (--attack-mode 1)<br />
I relly admire, if I can specify a directory directly on the command line, and hashcat will loop through all of the <span style="text-decoration: underline;" class="mycode_u">rules </span>in that directory automatically.<br />
<br />
Could you help me?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.15]]></title>
			<link>https://hashcat.net/forum/thread-2543.html</link>
			<pubDate>Sat, 24 Aug 2013 18:03:19 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2543.html</guid>
			<description><![CDATA[This version is the result of over 6 months of work, having modified 618,473 total lines of source code.<br />
<br />
Before we go into the details of the changes, here's a quick summary of the major changes:<br />
<ul class="mycode_list"><li>Added support for cracking passwords longer than 15 characters<br />
</li>
<li>Added support for mask-files, which enables password policy-specific candidate generation using PACK<br />
</li>
<li>Added support for multiple dictionaries in attack modes other than straight mode<br />
</li>
<li>Rewrote workload dispatcher from scratch<br />
</li>
<li>Rewrote restore support from scratch<br />
</li>
<li>Rewrote kernel scheduler to reduce screen lags<br />
</li>
<li>Better handling of smaller workloads/dictionaries<br />
</li>
<li>Language-specific charset presets for use with masks<br />
</li>
</ul>
<br />
New supported algorithms:<br />
<ul class="mycode_list"><li>TrueCrypt 5.0+<br />
</li>
<li>1Password<br />
</li>
<li>Lastpass<br />
</li>
<li>OpenLDAP {SSHA512}<br />
</li>
<li>AIX {SMD5} and {SSHA*}<br />
</li>
<li>SHA256(Unix) aka sha256crypt<br />
</li>
<li>MacOSX v10.8<br />
</li>
<li>Microsoft SQL Server 2012<br />
</li>
<li>Microsoft EPi Server v4+<br />
</li>
<li>Samsung Android Password/PIN<br />
</li>
<li>GRUB2<br />
</li>
<li>RipeMD160, Whirlpool, sha256-unicode, sha512-unicode, ...<br />
</li>
</ul>
<br />
New supported GPUs:<br />
<br />
NVidia:<br />
<ul class="mycode_list"><li>All sm_35-based GPUs<br />
</li>
<li>GTX Titan<br />
</li>
<li>GTX 7xx<br />
</li>
<li>Tesla K20<br />
</li>
</ul>
<br />
AMD:<br />
<ul class="mycode_list"><li>All Caicos, Oland, Bonaire, Kalindi and Hainan -based GPU/APU<br />
</li>
<li>hd77xx<br />
</li>
<li>hd8xxx<br />
</li>
</ul>
<br />
And last but not least, lots of bugs have been fixed. For a full list, see the changelog below.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Passwords longer than 15 characters</span><br />
<br />
This was by far one of the most requested features. We resisted adding this "feature", as it would force us to remove several optimizations, resulting in a decrease in performance for the fast hashes. The actual performance loss depends on several factors (GPU, attack mode, etc), but typically averages around 15%.<br />
<br />
Adding support for passwords longer than 15 characters required removing the following optimizations for fast hashes:<br />
<br />
<ol type="1" class="mycode_list"><li><span style="text-decoration: underline;" class="mycode_u">Zero-based optimizations</span>: Many algorithms can be optimized based on the fact that zero values in arithmetic or logic operations do not change the input value. With a password limit of less than 16 characters, it was guaranteed that values for positions 16-63 were zero, allowing us to omit dozens of operations from each step. These optimizations can no longer be used. I explain this in a bit more detail in my Passwords13 presentation: <a href="http://hashcat.net/p13/js-ocohaaaa.pdf" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/p13/js-ocohaaaa.pdf</a><br />
<br />
</li>
<li><span style="text-decoration: underline;" class="mycode_u">Register pressure</span>: If a password is 15 characters or less, we only need four 32-bit registers to hold it. But as we increase the length, more registers are required. This can slow down the entire process if more registers are required than accessible, as the compiler has to swap out data to global memory. Supporting passwords longer than 15 characters increases register pressure.<br />
<br />
</li>
<li><span style="text-decoration: underline;" class="mycode_u">Wordlist caching</span>: oclHashcat-plus handles wordlist data in a very unique way. The words are not simply pushed to GPU from start to finish; they are first sorted by length. This is done because many algorithms can be further optimized when all of the input data is the same length. oclHashcat-plus v0.14 attempted to cache all words of a specific length until it hit a threshold, and then flushed the cache. This required a lot of host memory. Depending on the number of GPUs we have and the specified -n value, oclHashcat-plus easily allocated 16GB of host memory, and even more for large VCL clusters. This buffer would have been increased 4x since we wanted to increase from a maximum length of 16 to a maximum length of 64. In other words, our host system would request 64GB of RAM!<br />
</li>
</ol>
<br />
We've spent a lot of time focusing on these issues, trying to minimize the impact of each. The good news is that we were able to solve #2 and #3. But, because there is no solution for #1, there will still be some performance loss in some cases.<br />
<br />
The precise decrease depends on GPU type, algorithm, number of hashes, well... just about everything! But, we also managed to <span style="font-weight: bold;" class="mycode_b">increase</span> performance for some algorithms, too. In order to solve #2, we rewrote nearly all candidate-generating code, and found some sections that could be optimized. In other words, the solution to #2 was to optimize the code in special sections, and then use the resulting performance increase to compensate against the performance decrease. Also, some of the algorithms do not require a lot of registers. All in all, the losses are less than expected.<br />
<br />
To solve #3, we had to rewrite the workload dispatcher from scratch. There's a special subsection about that topic below, since it contains some other important information as well. As a positive sideeffect of this solution, the host memory requirements are now less than those of v0.14!<br />
<br />
The slow hash types will <span style="font-weight: bold;" class="mycode_b">not</span> drop in speed, except for phpass and md5crypt:<br />
<ul class="mycode_list"><li>phpass, MD5(Wordpress), MD5(phpBB3)<br />
</li>
<li>md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5<br />
</li>
<li>md5apr1, MD5(APR), Apache MD5<br />
</li>
<li>sha512crypt, SHA512(Unix)<br />
</li>
<li>Domain Cached Credentials2, mscash2<br />
</li>
<li>WPA/WPA2<br />
</li>
<li>bcrypt, Blowfish(OpenBSD)<br />
</li>
<li>Password Safe SHA-256<br />
</li>
<li>TrueCrypt<br />
</li>
<li>1Password<br />
</li>
<li>Lastpass<br />
</li>
<li>sha256crypt, SHA256(Unix)<br />
</li>
</ul>
<br />
If you're curious about real-world performance losses and gains between v0.14 and v0.15, we've compiled a table that compares the two versions for each architecture:<br />
<br />
<br />
<div style="text-align: center;" class="mycode_align"><img src="http://hashcat.net/misc/p015_img/speed_v14_to_v15.png" loading="lazy"  alt="[Image: speed_v14_to_v15.png]" class="mycode_img" /></div>
<br />
<br />
This table shows single-hash MD5, which has been choosen since it's a very sensible hash-type. Changes to this hash-type typically reflect onto other hashes as well.<br />
<br />
Note: Because we've had to make a lot of deep changes to the core of hashcat, there can be no "old" method for &lt; 16 character support as many people already suggested. The changes we made are to deep and they are no longer compatible to old-style kernels, and we really don't want to maintain two different tools.<br />
<br />
One last note about performance. There was a change to the status-display of the speed value which does not affect the real performance. With new oclHashcat-plus v0.15 the speed that is shown gets divided by the number of uncracked unique salts. Older oclHashcat-plus versions did not take this into account. Don't get shocked when you're cracking a large salted hashlist and the speed dropped by hundret of times (or to be exact by number of hashes/salts), the total time will stay equal.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Essential performance note</span><br />
<br />
We can help hashcat compensate for the performance decrease by preparing our dictionaries!<br />
<br />
Get hashcat-utils, and run your dictionaries through <span style="font-style: italic;" class="mycode_i">splitlen</span>. Using rockyou.txt as an example:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
&#36; mkdir foo<br />
&#36; ./splitlen.bin foo &lt; rockyou.txt<br />
&#36; cat foo/* &gt; rockyou-sorted.txt<br />
</span></blockquote>
<br />
The example works on windows, too.<br />
<br />
This typically gives 15% speed boost, because we get much higher cache hits. This is essential, especially for VLIW4 and VLIW5 systems.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Passwords less than 55 characters</span><br />
<br />
Adding support for passwords longer than 15 characters does not <span style="font-style: italic;" class="mycode_i">completely</span> remove the length limitations in hashcat. Generally speaking, the new maximum length is <span style="font-weight: bold;" class="mycode_b">55 characters</span>, except in the following cases:<br />
<br />
For slow hashes:<br />
<ul class="mycode_list"><li>mode 400 is limited to 40 characters<br />
</li>
<li>mode 5200 is limited to 24 characters<br />
</li>
<li>modes 500, 1600, 1800, 3200, 5300, 6300 and 7400 are limited to 16 characters<br />
</li>
</ul>
NOTE: We're planing to remove the limits for these modes in the next version.<br />
<br />
For fast hashes, the important factor is the attack mode:<br />
<ul class="mycode_list"><li>attack-mode 0, the maximum length is 31<br />
</li>
<li>attack-mode 1, the maximum size of the words of both dictionaries is 31<br />
</li>
<li>attack-mode 6 and 7, the maximum size of the words of the dictionary is 31<br />
</li>
</ul>
<br />
Just to make this clear: We can crack passwords up to length 55, but in case we're doing a combinator attack, the words from both dictionaries can not be longer than 31 characters. But if the word from the left dictionary has the length 24 and the word from the right dictionary is 28, it will be cracked, because together they have length 52.<br />
<br />
Also note that algorithms based on unicode, from plaintext view, only support a maximum of 27. This is because unicode uses two bytes per character, making it 27 * 2 = 54.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">TrueCrypt 5.0+</span><br />
<br />
Finally, we have a TrueCrypt cracking mode that fully computes on GPU -- everything is written 100% on GPU! There is no copy overhead to the host, thus our CPU will stay cool at 0% and we can do whatever we want to do with it.<br />
<br />
Current implementation is able to crack the following supported hashes:<br />
<ul class="mycode_list"><li>RipeMD160<br />
</li>
<li>SHA512<br />
</li>
<li>Whirlpool<br />
</li>
</ul>
<br />
For the ciphers, we're currently doing only AES, and of course the XTS block-cipher. Serpent and Twofish -- and their cascaded modes -- will be added next.<br />
<br />
Here are some speeds from 2x hd6990:<br />
<ul class="mycode_list"><li>PBKDF2-HMAC-RipeMD160 / AES: 223 kHash/s<br />
</li>
<li>PBKDF2-HMAC-SHA512 / AES: 95 kHash/s<br />
</li>
<li>PBKDF2-HMAC-Whirlpool / AES: 49 kHash/s *updated*<br />
</li>
<li>PBKDF2-HMAC-RipeMD160 boot-mode / AES: 451 kHash/s<br />
</li>
</ul>
<br />
These tests show oclHashcat-plus is world's fastest TrueCrypt cracker!! <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Here's the original article: <a href="http://hashcat.net/forum/thread-2301.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-2301.html</a><br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Mask files</span><br />
<br />
Mask files are very easy to understand: they are just plain text file with one mask per line. Supply the filename instead of a mask on the command line, and hashcat will automatically loop through the masks in the file -- see some examples here: <a href="http://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/wiki/doku.php?id=mask...mask_files</a><br />
<br />
Until now to use a list of masks, we would need to manually iterate (or using some self-made wrapper scripts) through the set of masks, fully restarting hashcat on each loop iteration. It worked, but we suffered from the startup and shutdown times for each invocation. Storing those masks into a hcmask file and using this new feature is much faster, especially when we have lots of small masks.<br />
<br />
The coolest thing though is what iPhelix from Team Hashcat made out of this feature...<br />
<br />
If we're a pentester, and we're to audit an AD domain, we typically face a password policy. Password policies aren't always very clever; most of the time, they force users to select passwords with predictable patterns (you can read more about this topic in Minga's Passwords13 talk). Using a specific set of masks we can avoid candidate passwords that do not match the policy, thus reducing the keyspace efficiently. There are a few ways to do this. For example, we could pre-check our password candidates against a policy, which requires some branching, and we all know GPUs are bad when it comes to branching.<br />
<br />
Therefore, it's far more clever to simply never generate those candidates which do not match the password complexity policy, and that's where this new feature comes in. iPhelix, the autor of the PACK, wrote a tool to automatically create mask files for us based on a password policy. He also added some preset mask files for default AD password policies! I strongly recommend you take a look at PACK: <a href="http://thesprawl.org/projects/pack/" target="_blank" rel="noopener" class="mycode_url">http://thesprawl.org/projects/pack/</a><br />
<br />
With Hashcat, PACK, and mask file support, we now have a completely unique and powerful feature that no other password cracking program supports!<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Directories containing dictionaries</span><br />
<br />
You already know that with straight mode, you can specify a directory directly on the command line, and hashcat will loop through all of the dictionaries in that directory automatically.<br />
<br />
Now you can do this in hybrid modes, too!<br />
<br />
The same is true for using multiple dictionaries on command line. For hybrid-mode, the mask is always just a single argument. That means that for instance for -a 6, all arguments except the last one can be dictionaries.<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Rewrote workload dispatcher</span><br />
<br />
<br />
This was required to solve problem #3 from the password length increase, but it quickly turned out to add some unexpected benefits. One benefit is the way smaller workloads are handled.<br />
<br />
A problem that every one of us ran into was that, with small workloads, oclHashcat-plus did not fully utilize the power of all GPUs. To fully utilize the GPUs, there need to be enough different input data for the calculation. For example, when oclHashcat-plus displays that it is cracking at a rate of 8.3 GH/s, the program actually requires us to feed it with 8,300,000,000 different words per second. We get that high of a number because of the attack modes. Our dictionary does not need to have 8,300,000,000 different words, but if we were to run it in -a 0 mode with 40,000 rules, we still need to feed it with 207,500 words from our dictionary per second (207,500 * 40,000 = 8,300,000,000). Well actually that's not entirely correct. We still need to invoke the GPU kernel and compute the hashes on it and this tasks takes 99.9% of the time. So to load this stuff, we actually have just a few miliseconds otherwise our cracking speed will drop since the GPU is idleing.<br />
<br />
The typical process is that our host program parses the dictionary, then copies it to the GPU, then runs the kernel and collects the results. Now, because of the old caching structure, oclHashcat-plus was a bit more complicated than this. It was not loading 207,500 words from our dictionary per second -- it was loading much more. And then it was sorting the words by length into specific buffers. Once a buffer's threshold was reached, it pushed the buffer to GPU, processed it, and collected the results.<br />
<br />
The typical dictionary does not contain only words of one specific length (unless we run it through splitlen.bin from hashcat-utils). Typically, most of the words range from six to ten characters. We know these graphs, right? Let's say the distribution for all words of length 6 - 10 is all the same (which it isn't really, but it's easier to explain this way), then only every 5th word has a length of 8 characters. In other words, to feed oclHashcat-plus fast enough, the host program needed to parse 5 * 207,500 words from our dictionary per second.<br />
<br />
Now think of a small dictionary, like milworm with 80k or what it has. We cannot even feed the 207,500 words required with it. And it's actually much worse, since the 80k has to be divided by 5 because of the above reason. So, we only provided oclHashcat-plus with 16k words from our dictionary per second, not with 207k. So the GPU wasn't able to exceed ~7% utilization. And then, we still have some small number for length 22 or 43 left that need to be checked... what a waste of time! This is typically what we saw at the end of each run.<br />
<br />
With oclHashcat-plus v0.15, this structure has radically changed. There is still some caching, but it's totally different. We don't want to go to much into detail, but typically the divisor is now just 2. We still can not fully utilize all power with a tiny dictionary, but the requirement from huge dictionaries is much less.<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Thanks</span><br />
<br />
Many thanks to our beta testers, and everyone reporting bugs on the hashcat TRAC system. This is really pushing the project forward, and we greatly appreciate your effort. Please continue to support us!<br />
<br />
We also want to thank KoreLogic for the "Crack Me If You Can" contest and the organizers from PHD's "Hashrunner". These contests give us a good view on what a typical pentester / IT-forensic needs and shows a direction to go.<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full Changelog</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
* changes v0.14 -&gt; v0.15:<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.4 (new GPU architectures: Bonaire, Kalindi, Hainan)<br />
trac: #127<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.6 beta<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.8 beta<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare 319.37<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 5.5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added support for password length up to 55<br />
<br />
type: feature<br />
file: kernels<br />
desc: allow variable salt length (length: 16 - 48) for aix hashes -m 6400, 6500, 6700<br />
<br />
type: feature<br />
file: kernels<br />
desc: variable number of iterations for hash modes 500, 1600, 1800, 7400 (using e.g. &#36;rounds=5000&#36;)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1430 = sha256(unicode(&#36;pass).&#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1440 = sha256(&#36;salt.unicode(&#36;pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1441 = EPiServer 6.x &gt; v4<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1711 = SSHA-512(Base64), LDAP {SSHA512}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1730 = sha512(unicode(&#36;pass).&#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1731 = MSSQL(2012)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1740 = sha512(&#36;salt.unicode(&#36;pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 5800 = Samsung Android Password/PIN<br />
cred: Bjoern Kerler<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6000 = RipeMD160<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6100 = Whirlpool<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6200 = TrueCrypt 5.0+<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6300 = AIX {smd5}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6400 = AIX {ssha256}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6500 = AIX {ssha512}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6600 = 1Password<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6700 = AIX {ssha1}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6800 = Lastpass<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 7100 = OS X v10.8<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 7200 = GRUB 2<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 7400 = sha256crypt, SHA256(Unix)<br />
<br />
type: feature<br />
file: kernels<br />
desc: moved word-generator out of main kernels, as seen in oclHashcat-lite, reduces diskspace<br />
<br />
type: feature<br />
file: kernels<br />
desc: changed the E rule to lowercase all input before processing, its more intuitive<br />
trac: #110<br />
<br />
type: bug<br />
file: kernels<br />
desc: rule * worked only for adjacent characters<br />
trac: #110<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed support for new GPU architectures: Oland<br />
trac: #128<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed a bug in Half MD5, in multi-hash mode it only found the first hash<br />
trac: #136<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function (JtR compatible): M - memorize the word (for use with "Q", "X", "4" and "6")<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function (JtR compatible): Q - query the memory and reject the word unless it has changed<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function (JtR compatible): X - extract substring NM from memory and insert into current word at I<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function: 4 - appends word from memory to current word<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function: 6 - prepends word from memory to current word<br />
<br />
type: feature<br />
file: host programs<br />
desc: add rule file rules/rockyou-30000.rule based on PACK output<br />
cred: iphelix<br />
<br />
type: feature<br />
file: host programs<br />
desc: the .restore file now remembers also the last processed position in maskfiles<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed special VCL binaries - Not longer required since VCL 1.21 works transparently<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for Tesla Deployment Kit v2.295.2<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for NVAPI R313<br />
<br />
type: feature<br />
file: host programs<br />
desc: add presets for .hcmask files based on PACK output. One policy covering for default AD scheme and one best-of-in-time-x based on rockyou<br />
<br />
type: feature<br />
file: host programs<br />
desc: dropped predefined charsets ?h, ?F, ?G and ?R<br />
trac: #55<br />
<br />
type: feature<br />
file: host programs<br />
desc: added a collection of language-specific charset-files for use with masks<br />
trac: #55<br />
<br />
type: feature<br />
file: host programs<br />
desc: allow users to specify multiple dicts and/or directories containing dicts<br />
trac: #71<br />
<br />
type: feature<br />
file: host programs<br />
desc: support added to allow salts of length 1-31 for mode 111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA<br />
trac: #78<br />
<br />
type: feature<br />
file: host programs<br />
desc: allow users to add masks using a file containing one or multiple masks, one per line, called .hcmask files<br />
trac: #79<br />
<br />
type: feature<br />
file: host programs<br />
desc: Leave username in hash file when using --remove together w/ --username<br />
trac: #116<br />
<br />
type: feature<br />
file: host programs<br />
desc: Format output according to --outfile-format option when using --show<br />
trac: #117<br />
<br />
type: feature<br />
file: host programs<br />
desc: changed units of measurement in terms of H/s, KH/s, MH/s, etc...<br />
trac: #130<br />
<br />
type: feature<br />
file: host programs<br />
desc: do not allow loading of duplicate rules (like hashcat)<br />
trac: #132<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed rules/perfect.rule<br />
trac: #132<br />
<br />
type: feature<br />
file: host programs<br />
desc: reject -r option when not using straight attack -a 0<br />
trac: #169<br />
<br />
type: feature<br />
file: host programs<br />
desc: show mask length in status screen<br />
trac: #180<br />
<br />
type: bug<br />
file: host programs<br />
desc: Runtime timer (--runtime) delayed the program exit when using a huge list of hashes<br />
trac: #93<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in NetNTLMv2 parser, did not took client challenge into sort for unique<br />
trac: #106<br />
<br />
type: bug<br />
file: host programs<br />
desc: rare triggered crash when file opening/writing fails<br />
trac: #111<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in NetNTLMv2 parser, only cracking first hash in file<br />
trac: #114<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in NetNTLMv2 parser, using --remove option replaces all the old users<br />
trac: #115<br />
<br />
type: bug<br />
file: host programs<br />
desc: ensure that DES output does not contain plains with lengths greater than 8<br />
<br />
type: bug<br />
file: host programs<br />
desc: don't force to update .restore too often e.g. when using -i and/or maskfiles<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed output of show/left when there are colons in the plaintext part (in hashcat.pot)<br />
<br />
type: change<br />
file: host programs<br />
desc: updated default values for --gpu-accel and --gpu-loops for NVidia<br />
cred: Rolf<br />
<br />
type: change<br />
file: host programs<br />
desc: changed speed display, now divides speed by number of uncracked unique salts<br />
<br />
type: change<br />
file: host programs<br />
desc: updated --help text regarding --username<br />
cred: #121<br />
<br />
type: feature<br />
file: rules<br />
desc: added a more more complex leetspeak rule from unix-ninja<br />
trac: #112<br />
<br />
type: feature<br />
file: rules<br />
desc: added a more more complex leetspeak rule from Incisive<br />
trac: #119<br />
</span></blockquote>
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[This version is the result of over 6 months of work, having modified 618,473 total lines of source code.<br />
<br />
Before we go into the details of the changes, here's a quick summary of the major changes:<br />
<ul class="mycode_list"><li>Added support for cracking passwords longer than 15 characters<br />
</li>
<li>Added support for mask-files, which enables password policy-specific candidate generation using PACK<br />
</li>
<li>Added support for multiple dictionaries in attack modes other than straight mode<br />
</li>
<li>Rewrote workload dispatcher from scratch<br />
</li>
<li>Rewrote restore support from scratch<br />
</li>
<li>Rewrote kernel scheduler to reduce screen lags<br />
</li>
<li>Better handling of smaller workloads/dictionaries<br />
</li>
<li>Language-specific charset presets for use with masks<br />
</li>
</ul>
<br />
New supported algorithms:<br />
<ul class="mycode_list"><li>TrueCrypt 5.0+<br />
</li>
<li>1Password<br />
</li>
<li>Lastpass<br />
</li>
<li>OpenLDAP {SSHA512}<br />
</li>
<li>AIX {SMD5} and {SSHA*}<br />
</li>
<li>SHA256(Unix) aka sha256crypt<br />
</li>
<li>MacOSX v10.8<br />
</li>
<li>Microsoft SQL Server 2012<br />
</li>
<li>Microsoft EPi Server v4+<br />
</li>
<li>Samsung Android Password/PIN<br />
</li>
<li>GRUB2<br />
</li>
<li>RipeMD160, Whirlpool, sha256-unicode, sha512-unicode, ...<br />
</li>
</ul>
<br />
New supported GPUs:<br />
<br />
NVidia:<br />
<ul class="mycode_list"><li>All sm_35-based GPUs<br />
</li>
<li>GTX Titan<br />
</li>
<li>GTX 7xx<br />
</li>
<li>Tesla K20<br />
</li>
</ul>
<br />
AMD:<br />
<ul class="mycode_list"><li>All Caicos, Oland, Bonaire, Kalindi and Hainan -based GPU/APU<br />
</li>
<li>hd77xx<br />
</li>
<li>hd8xxx<br />
</li>
</ul>
<br />
And last but not least, lots of bugs have been fixed. For a full list, see the changelog below.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Passwords longer than 15 characters</span><br />
<br />
This was by far one of the most requested features. We resisted adding this "feature", as it would force us to remove several optimizations, resulting in a decrease in performance for the fast hashes. The actual performance loss depends on several factors (GPU, attack mode, etc), but typically averages around 15%.<br />
<br />
Adding support for passwords longer than 15 characters required removing the following optimizations for fast hashes:<br />
<br />
<ol type="1" class="mycode_list"><li><span style="text-decoration: underline;" class="mycode_u">Zero-based optimizations</span>: Many algorithms can be optimized based on the fact that zero values in arithmetic or logic operations do not change the input value. With a password limit of less than 16 characters, it was guaranteed that values for positions 16-63 were zero, allowing us to omit dozens of operations from each step. These optimizations can no longer be used. I explain this in a bit more detail in my Passwords13 presentation: <a href="http://hashcat.net/p13/js-ocohaaaa.pdf" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/p13/js-ocohaaaa.pdf</a><br />
<br />
</li>
<li><span style="text-decoration: underline;" class="mycode_u">Register pressure</span>: If a password is 15 characters or less, we only need four 32-bit registers to hold it. But as we increase the length, more registers are required. This can slow down the entire process if more registers are required than accessible, as the compiler has to swap out data to global memory. Supporting passwords longer than 15 characters increases register pressure.<br />
<br />
</li>
<li><span style="text-decoration: underline;" class="mycode_u">Wordlist caching</span>: oclHashcat-plus handles wordlist data in a very unique way. The words are not simply pushed to GPU from start to finish; they are first sorted by length. This is done because many algorithms can be further optimized when all of the input data is the same length. oclHashcat-plus v0.14 attempted to cache all words of a specific length until it hit a threshold, and then flushed the cache. This required a lot of host memory. Depending on the number of GPUs we have and the specified -n value, oclHashcat-plus easily allocated 16GB of host memory, and even more for large VCL clusters. This buffer would have been increased 4x since we wanted to increase from a maximum length of 16 to a maximum length of 64. In other words, our host system would request 64GB of RAM!<br />
</li>
</ol>
<br />
We've spent a lot of time focusing on these issues, trying to minimize the impact of each. The good news is that we were able to solve #2 and #3. But, because there is no solution for #1, there will still be some performance loss in some cases.<br />
<br />
The precise decrease depends on GPU type, algorithm, number of hashes, well... just about everything! But, we also managed to <span style="font-weight: bold;" class="mycode_b">increase</span> performance for some algorithms, too. In order to solve #2, we rewrote nearly all candidate-generating code, and found some sections that could be optimized. In other words, the solution to #2 was to optimize the code in special sections, and then use the resulting performance increase to compensate against the performance decrease. Also, some of the algorithms do not require a lot of registers. All in all, the losses are less than expected.<br />
<br />
To solve #3, we had to rewrite the workload dispatcher from scratch. There's a special subsection about that topic below, since it contains some other important information as well. As a positive sideeffect of this solution, the host memory requirements are now less than those of v0.14!<br />
<br />
The slow hash types will <span style="font-weight: bold;" class="mycode_b">not</span> drop in speed, except for phpass and md5crypt:<br />
<ul class="mycode_list"><li>phpass, MD5(Wordpress), MD5(phpBB3)<br />
</li>
<li>md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5<br />
</li>
<li>md5apr1, MD5(APR), Apache MD5<br />
</li>
<li>sha512crypt, SHA512(Unix)<br />
</li>
<li>Domain Cached Credentials2, mscash2<br />
</li>
<li>WPA/WPA2<br />
</li>
<li>bcrypt, Blowfish(OpenBSD)<br />
</li>
<li>Password Safe SHA-256<br />
</li>
<li>TrueCrypt<br />
</li>
<li>1Password<br />
</li>
<li>Lastpass<br />
</li>
<li>sha256crypt, SHA256(Unix)<br />
</li>
</ul>
<br />
If you're curious about real-world performance losses and gains between v0.14 and v0.15, we've compiled a table that compares the two versions for each architecture:<br />
<br />
<br />
<div style="text-align: center;" class="mycode_align"><img src="http://hashcat.net/misc/p015_img/speed_v14_to_v15.png" loading="lazy"  alt="[Image: speed_v14_to_v15.png]" class="mycode_img" /></div>
<br />
<br />
This table shows single-hash MD5, which has been choosen since it's a very sensible hash-type. Changes to this hash-type typically reflect onto other hashes as well.<br />
<br />
Note: Because we've had to make a lot of deep changes to the core of hashcat, there can be no "old" method for &lt; 16 character support as many people already suggested. The changes we made are to deep and they are no longer compatible to old-style kernels, and we really don't want to maintain two different tools.<br />
<br />
One last note about performance. There was a change to the status-display of the speed value which does not affect the real performance. With new oclHashcat-plus v0.15 the speed that is shown gets divided by the number of uncracked unique salts. Older oclHashcat-plus versions did not take this into account. Don't get shocked when you're cracking a large salted hashlist and the speed dropped by hundret of times (or to be exact by number of hashes/salts), the total time will stay equal.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Essential performance note</span><br />
<br />
We can help hashcat compensate for the performance decrease by preparing our dictionaries!<br />
<br />
Get hashcat-utils, and run your dictionaries through <span style="font-style: italic;" class="mycode_i">splitlen</span>. Using rockyou.txt as an example:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
&#36; mkdir foo<br />
&#36; ./splitlen.bin foo &lt; rockyou.txt<br />
&#36; cat foo/* &gt; rockyou-sorted.txt<br />
</span></blockquote>
<br />
The example works on windows, too.<br />
<br />
This typically gives 15% speed boost, because we get much higher cache hits. This is essential, especially for VLIW4 and VLIW5 systems.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Passwords less than 55 characters</span><br />
<br />
Adding support for passwords longer than 15 characters does not <span style="font-style: italic;" class="mycode_i">completely</span> remove the length limitations in hashcat. Generally speaking, the new maximum length is <span style="font-weight: bold;" class="mycode_b">55 characters</span>, except in the following cases:<br />
<br />
For slow hashes:<br />
<ul class="mycode_list"><li>mode 400 is limited to 40 characters<br />
</li>
<li>mode 5200 is limited to 24 characters<br />
</li>
<li>modes 500, 1600, 1800, 3200, 5300, 6300 and 7400 are limited to 16 characters<br />
</li>
</ul>
NOTE: We're planing to remove the limits for these modes in the next version.<br />
<br />
For fast hashes, the important factor is the attack mode:<br />
<ul class="mycode_list"><li>attack-mode 0, the maximum length is 31<br />
</li>
<li>attack-mode 1, the maximum size of the words of both dictionaries is 31<br />
</li>
<li>attack-mode 6 and 7, the maximum size of the words of the dictionary is 31<br />
</li>
</ul>
<br />
Just to make this clear: We can crack passwords up to length 55, but in case we're doing a combinator attack, the words from both dictionaries can not be longer than 31 characters. But if the word from the left dictionary has the length 24 and the word from the right dictionary is 28, it will be cracked, because together they have length 52.<br />
<br />
Also note that algorithms based on unicode, from plaintext view, only support a maximum of 27. This is because unicode uses two bytes per character, making it 27 * 2 = 54.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">TrueCrypt 5.0+</span><br />
<br />
Finally, we have a TrueCrypt cracking mode that fully computes on GPU -- everything is written 100% on GPU! There is no copy overhead to the host, thus our CPU will stay cool at 0% and we can do whatever we want to do with it.<br />
<br />
Current implementation is able to crack the following supported hashes:<br />
<ul class="mycode_list"><li>RipeMD160<br />
</li>
<li>SHA512<br />
</li>
<li>Whirlpool<br />
</li>
</ul>
<br />
For the ciphers, we're currently doing only AES, and of course the XTS block-cipher. Serpent and Twofish -- and their cascaded modes -- will be added next.<br />
<br />
Here are some speeds from 2x hd6990:<br />
<ul class="mycode_list"><li>PBKDF2-HMAC-RipeMD160 / AES: 223 kHash/s<br />
</li>
<li>PBKDF2-HMAC-SHA512 / AES: 95 kHash/s<br />
</li>
<li>PBKDF2-HMAC-Whirlpool / AES: 49 kHash/s *updated*<br />
</li>
<li>PBKDF2-HMAC-RipeMD160 boot-mode / AES: 451 kHash/s<br />
</li>
</ul>
<br />
These tests show oclHashcat-plus is world's fastest TrueCrypt cracker!! <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Here's the original article: <a href="http://hashcat.net/forum/thread-2301.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-2301.html</a><br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Mask files</span><br />
<br />
Mask files are very easy to understand: they are just plain text file with one mask per line. Supply the filename instead of a mask on the command line, and hashcat will automatically loop through the masks in the file -- see some examples here: <a href="http://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/wiki/doku.php?id=mask...mask_files</a><br />
<br />
Until now to use a list of masks, we would need to manually iterate (or using some self-made wrapper scripts) through the set of masks, fully restarting hashcat on each loop iteration. It worked, but we suffered from the startup and shutdown times for each invocation. Storing those masks into a hcmask file and using this new feature is much faster, especially when we have lots of small masks.<br />
<br />
The coolest thing though is what iPhelix from Team Hashcat made out of this feature...<br />
<br />
If we're a pentester, and we're to audit an AD domain, we typically face a password policy. Password policies aren't always very clever; most of the time, they force users to select passwords with predictable patterns (you can read more about this topic in Minga's Passwords13 talk). Using a specific set of masks we can avoid candidate passwords that do not match the policy, thus reducing the keyspace efficiently. There are a few ways to do this. For example, we could pre-check our password candidates against a policy, which requires some branching, and we all know GPUs are bad when it comes to branching.<br />
<br />
Therefore, it's far more clever to simply never generate those candidates which do not match the password complexity policy, and that's where this new feature comes in. iPhelix, the autor of the PACK, wrote a tool to automatically create mask files for us based on a password policy. He also added some preset mask files for default AD password policies! I strongly recommend you take a look at PACK: <a href="http://thesprawl.org/projects/pack/" target="_blank" rel="noopener" class="mycode_url">http://thesprawl.org/projects/pack/</a><br />
<br />
With Hashcat, PACK, and mask file support, we now have a completely unique and powerful feature that no other password cracking program supports!<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Directories containing dictionaries</span><br />
<br />
You already know that with straight mode, you can specify a directory directly on the command line, and hashcat will loop through all of the dictionaries in that directory automatically.<br />
<br />
Now you can do this in hybrid modes, too!<br />
<br />
The same is true for using multiple dictionaries on command line. For hybrid-mode, the mask is always just a single argument. That means that for instance for -a 6, all arguments except the last one can be dictionaries.<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Rewrote workload dispatcher</span><br />
<br />
<br />
This was required to solve problem #3 from the password length increase, but it quickly turned out to add some unexpected benefits. One benefit is the way smaller workloads are handled.<br />
<br />
A problem that every one of us ran into was that, with small workloads, oclHashcat-plus did not fully utilize the power of all GPUs. To fully utilize the GPUs, there need to be enough different input data for the calculation. For example, when oclHashcat-plus displays that it is cracking at a rate of 8.3 GH/s, the program actually requires us to feed it with 8,300,000,000 different words per second. We get that high of a number because of the attack modes. Our dictionary does not need to have 8,300,000,000 different words, but if we were to run it in -a 0 mode with 40,000 rules, we still need to feed it with 207,500 words from our dictionary per second (207,500 * 40,000 = 8,300,000,000). Well actually that's not entirely correct. We still need to invoke the GPU kernel and compute the hashes on it and this tasks takes 99.9% of the time. So to load this stuff, we actually have just a few miliseconds otherwise our cracking speed will drop since the GPU is idleing.<br />
<br />
The typical process is that our host program parses the dictionary, then copies it to the GPU, then runs the kernel and collects the results. Now, because of the old caching structure, oclHashcat-plus was a bit more complicated than this. It was not loading 207,500 words from our dictionary per second -- it was loading much more. And then it was sorting the words by length into specific buffers. Once a buffer's threshold was reached, it pushed the buffer to GPU, processed it, and collected the results.<br />
<br />
The typical dictionary does not contain only words of one specific length (unless we run it through splitlen.bin from hashcat-utils). Typically, most of the words range from six to ten characters. We know these graphs, right? Let's say the distribution for all words of length 6 - 10 is all the same (which it isn't really, but it's easier to explain this way), then only every 5th word has a length of 8 characters. In other words, to feed oclHashcat-plus fast enough, the host program needed to parse 5 * 207,500 words from our dictionary per second.<br />
<br />
Now think of a small dictionary, like milworm with 80k or what it has. We cannot even feed the 207,500 words required with it. And it's actually much worse, since the 80k has to be divided by 5 because of the above reason. So, we only provided oclHashcat-plus with 16k words from our dictionary per second, not with 207k. So the GPU wasn't able to exceed ~7% utilization. And then, we still have some small number for length 22 or 43 left that need to be checked... what a waste of time! This is typically what we saw at the end of each run.<br />
<br />
With oclHashcat-plus v0.15, this structure has radically changed. There is still some caching, but it's totally different. We don't want to go to much into detail, but typically the divisor is now just 2. We still can not fully utilize all power with a tiny dictionary, but the requirement from huge dictionaries is much less.<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Thanks</span><br />
<br />
Many thanks to our beta testers, and everyone reporting bugs on the hashcat TRAC system. This is really pushing the project forward, and we greatly appreciate your effort. Please continue to support us!<br />
<br />
We also want to thank KoreLogic for the "Crack Me If You Can" contest and the organizers from PHD's "Hashrunner". These contests give us a good view on what a typical pentester / IT-forensic needs and shows a direction to go.<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full Changelog</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
* changes v0.14 -&gt; v0.15:<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.4 (new GPU architectures: Bonaire, Kalindi, Hainan)<br />
trac: #127<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.6 beta<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.8 beta<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare 319.37<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 5.5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added support for password length up to 55<br />
<br />
type: feature<br />
file: kernels<br />
desc: allow variable salt length (length: 16 - 48) for aix hashes -m 6400, 6500, 6700<br />
<br />
type: feature<br />
file: kernels<br />
desc: variable number of iterations for hash modes 500, 1600, 1800, 7400 (using e.g. &#36;rounds=5000&#36;)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1430 = sha256(unicode(&#36;pass).&#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1440 = sha256(&#36;salt.unicode(&#36;pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1441 = EPiServer 6.x &gt; v4<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1711 = SSHA-512(Base64), LDAP {SSHA512}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1730 = sha512(unicode(&#36;pass).&#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1731 = MSSQL(2012)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 1740 = sha512(&#36;salt.unicode(&#36;pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 5800 = Samsung Android Password/PIN<br />
cred: Bjoern Kerler<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6000 = RipeMD160<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6100 = Whirlpool<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6200 = TrueCrypt 5.0+<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6300 = AIX {smd5}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6400 = AIX {ssha256}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6500 = AIX {ssha512}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6600 = 1Password<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6700 = AIX {ssha1}<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 6800 = Lastpass<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 7100 = OS X v10.8<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 7200 = GRUB 2<br />
<br />
type: feature<br />
file: kernels<br />
desc: added mode -m 7400 = sha256crypt, SHA256(Unix)<br />
<br />
type: feature<br />
file: kernels<br />
desc: moved word-generator out of main kernels, as seen in oclHashcat-lite, reduces diskspace<br />
<br />
type: feature<br />
file: kernels<br />
desc: changed the E rule to lowercase all input before processing, its more intuitive<br />
trac: #110<br />
<br />
type: bug<br />
file: kernels<br />
desc: rule * worked only for adjacent characters<br />
trac: #110<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed support for new GPU architectures: Oland<br />
trac: #128<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed a bug in Half MD5, in multi-hash mode it only found the first hash<br />
trac: #136<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function (JtR compatible): M - memorize the word (for use with "Q", "X", "4" and "6")<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function (JtR compatible): Q - query the memory and reject the word unless it has changed<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function (JtR compatible): X - extract substring NM from memory and insert into current word at I<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function: 4 - appends word from memory to current word<br />
<br />
type: feature<br />
file: host programs<br />
desc: added new rule function: 6 - prepends word from memory to current word<br />
<br />
type: feature<br />
file: host programs<br />
desc: add rule file rules/rockyou-30000.rule based on PACK output<br />
cred: iphelix<br />
<br />
type: feature<br />
file: host programs<br />
desc: the .restore file now remembers also the last processed position in maskfiles<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed special VCL binaries - Not longer required since VCL 1.21 works transparently<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for Tesla Deployment Kit v2.295.2<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for NVAPI R313<br />
<br />
type: feature<br />
file: host programs<br />
desc: add presets for .hcmask files based on PACK output. One policy covering for default AD scheme and one best-of-in-time-x based on rockyou<br />
<br />
type: feature<br />
file: host programs<br />
desc: dropped predefined charsets ?h, ?F, ?G and ?R<br />
trac: #55<br />
<br />
type: feature<br />
file: host programs<br />
desc: added a collection of language-specific charset-files for use with masks<br />
trac: #55<br />
<br />
type: feature<br />
file: host programs<br />
desc: allow users to specify multiple dicts and/or directories containing dicts<br />
trac: #71<br />
<br />
type: feature<br />
file: host programs<br />
desc: support added to allow salts of length 1-31 for mode 111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA<br />
trac: #78<br />
<br />
type: feature<br />
file: host programs<br />
desc: allow users to add masks using a file containing one or multiple masks, one per line, called .hcmask files<br />
trac: #79<br />
<br />
type: feature<br />
file: host programs<br />
desc: Leave username in hash file when using --remove together w/ --username<br />
trac: #116<br />
<br />
type: feature<br />
file: host programs<br />
desc: Format output according to --outfile-format option when using --show<br />
trac: #117<br />
<br />
type: feature<br />
file: host programs<br />
desc: changed units of measurement in terms of H/s, KH/s, MH/s, etc...<br />
trac: #130<br />
<br />
type: feature<br />
file: host programs<br />
desc: do not allow loading of duplicate rules (like hashcat)<br />
trac: #132<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed rules/perfect.rule<br />
trac: #132<br />
<br />
type: feature<br />
file: host programs<br />
desc: reject -r option when not using straight attack -a 0<br />
trac: #169<br />
<br />
type: feature<br />
file: host programs<br />
desc: show mask length in status screen<br />
trac: #180<br />
<br />
type: bug<br />
file: host programs<br />
desc: Runtime timer (--runtime) delayed the program exit when using a huge list of hashes<br />
trac: #93<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in NetNTLMv2 parser, did not took client challenge into sort for unique<br />
trac: #106<br />
<br />
type: bug<br />
file: host programs<br />
desc: rare triggered crash when file opening/writing fails<br />
trac: #111<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in NetNTLMv2 parser, only cracking first hash in file<br />
trac: #114<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in NetNTLMv2 parser, using --remove option replaces all the old users<br />
trac: #115<br />
<br />
type: bug<br />
file: host programs<br />
desc: ensure that DES output does not contain plains with lengths greater than 8<br />
<br />
type: bug<br />
file: host programs<br />
desc: don't force to update .restore too often e.g. when using -i and/or maskfiles<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed output of show/left when there are colons in the plaintext part (in hashcat.pot)<br />
<br />
type: change<br />
file: host programs<br />
desc: updated default values for --gpu-accel and --gpu-loops for NVidia<br />
cred: Rolf<br />
<br />
type: change<br />
file: host programs<br />
desc: changed speed display, now divides speed by number of uncracked unique salts<br />
<br />
type: change<br />
file: host programs<br />
desc: updated --help text regarding --username<br />
cred: #121<br />
<br />
type: feature<br />
file: rules<br />
desc: added a more more complex leetspeak rule from unix-ninja<br />
trac: #112<br />
<br />
type: feature<br />
file: rules<br />
desc: added a more more complex leetspeak rule from Incisive<br />
trac: #119<br />
</span></blockquote>
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[hashcat v0.44, oclHashcat-plus v0.14 and oclHashcat-lite v0.15]]></title>
			<link>https://hashcat.net/forum/thread-2160.html</link>
			<pubDate>Fri, 22 Mar 2013 16:10:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2160.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
hashcat v0.44:<br />
<br />
Download here: <a href="http://hashcat.net/hashcat/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/hashcat/</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 9999 = Plaintext<br />
trac: #45<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5500 = NetNTLMv1 + ESS<br />
trac: #96<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5700 = Cisco-IOS SHA256<br />
cred: philsmd<br />
<br />
type: change<br />
file: hashcat-cli<br />
desc: changed the hash-format for NetNTLMv1 and NetNTLMv2 to .lc format<br />
cred: #98<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in 32 bit version, did not crack -m 1800 sha512crypt<br />
trac: #92<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in NetNTLMv2 parser<br />
trac: #95<br />
<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
oclHashcat-plus v0.14:<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: driver<br />
file: host programs<br />
desc: added support for AMD ADL v5.0 library<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5500 = NetNTLMv1-VANILLA / NetNTLMv1+ESS<br />
trac: #51<br />
trac: #96<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5600 = NetNTLMv2<br />
trac: #56<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5700 = Cisco-IOS SHA256<br />
cred: philsmd<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so that it accepts only 16 byte input, see next change why<br />
trac: #89<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so it can crack middle and right portions, too (not just left)<br />
trac: #89<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version had to switch back to bitness-depending kernels<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version writing to constant memory from kernel isnt allowed<br />
<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
oclHashcat-lite v0.15:<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-lite/</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: driver<br />
file: host programs<br />
desc: added support for AMD ADL v5.0 library<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5500 = NetNTLMv1-VANILLA / NetNTLMv1+ESS<br />
trac: #51<br />
trac: #96<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5600 = NetNTLMv2<br />
trac: #56<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5700 = Cisco-IOS SHA256<br />
cred: philsmd<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so that it accepts only 16 byte input, see next change why<br />
trac: #89<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so it can crack middle and right portions, too (not just left)<br />
trac: #89<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version had to switch back to bitness-depending kernels<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version writing to constant memory from kernel isnt allowed<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in benchmark-mode, do not run MD5 again at end<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in benchmark-mode, Memory stepping when doing a benchmark<br />
trac: #57<br />
<br />
</span></blockquote>
]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
hashcat v0.44:<br />
<br />
Download here: <a href="http://hashcat.net/hashcat/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/hashcat/</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 9999 = Plaintext<br />
trac: #45<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5500 = NetNTLMv1 + ESS<br />
trac: #96<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5700 = Cisco-IOS SHA256<br />
cred: philsmd<br />
<br />
type: change<br />
file: hashcat-cli<br />
desc: changed the hash-format for NetNTLMv1 and NetNTLMv2 to .lc format<br />
cred: #98<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in 32 bit version, did not crack -m 1800 sha512crypt<br />
trac: #92<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in NetNTLMv2 parser<br />
trac: #95<br />
<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
oclHashcat-plus v0.14:<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: driver<br />
file: host programs<br />
desc: added support for AMD ADL v5.0 library<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5500 = NetNTLMv1-VANILLA / NetNTLMv1+ESS<br />
trac: #51<br />
trac: #96<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5600 = NetNTLMv2<br />
trac: #56<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5700 = Cisco-IOS SHA256<br />
cred: philsmd<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so that it accepts only 16 byte input, see next change why<br />
trac: #89<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so it can crack middle and right portions, too (not just left)<br />
trac: #89<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version had to switch back to bitness-depending kernels<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version writing to constant memory from kernel isnt allowed<br />
<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
oclHashcat-lite v0.15:<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-lite/</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: driver<br />
file: host programs<br />
desc: added support for AMD ADL v5.0 library<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5500 = NetNTLMv1-VANILLA / NetNTLMv1+ESS<br />
trac: #51<br />
trac: #96<br />
<br />
type: feature<br />
file: hashcat-cli<br />
desc: added mode -m 5600 = NetNTLMv2<br />
trac: #56<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5700 = Cisco-IOS SHA256<br />
cred: philsmd<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so that it accepts only 16 byte input, see next change why<br />
trac: #89<br />
<br />
type: feature<br />
file: kernels<br />
desc: modified -m 5100 = Half MD5 so it can crack middle and right portions, too (not just left)<br />
trac: #89<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version had to switch back to bitness-depending kernels<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NVidia version writing to constant memory from kernel isnt allowed<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in benchmark-mode, do not run MD5 again at end<br />
<br />
type: bug<br />
file: hashcat-cli<br />
desc: fixed bug in benchmark-mode, Memory stepping when doing a benchmark<br />
trac: #57<br />
<br />
</span></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.13 and oclHashcat-lite v0.14]]></title>
			<link>https://hashcat.net/forum/thread-2024.html</link>
			<pubDate>Fri, 01 Feb 2013 11:09:59 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2024.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
This update is about:<br />
<ul class="mycode_list"><li>Support for new drivers<br />
</li>
<li>Support for new algorithms<br />
</li>
<li>Support for new GPU types<br />
</li>
<li>Bugfixes<br />
</li>
</ul>
Based on what user reported on our new tracker: <a href="http://hashcat.net/trac/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/trac/</a> - Thanks guys!<br />
<br />
Download it here:<br />
<br />
oclHashcat-plus: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
oclHashcat-lite: <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-lite/</a><br />
<br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-plus in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.1 (new GPU architectures: Oland, Cats, Raccoons)<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.8<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia sm_35 gpu-architecture [ Tesla K20* ]<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5100 = Half MD5<br />
trac: #6<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5200 = Password Safe SHA-256<br />
trac: #19<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5300 = IKE-PSK MD5<br />
trac: #5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5400 = IKE-PSK SHA1<br />
trac: #5<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --status and --status-timer for automatic status-display updates without pressing "s"<br />
trac: #4<br />
<br />
type: feature<br />
file: host programs<br />
desc: when using the --show or the --left switch make use of --outfile in case user specified it<br />
trac: #12<br />
<br />
type: feature<br />
file: host programs<br />
desc: added percentage of recovered hashes / salts in status-display<br />
trac: #13<br />
<br />
type: feature<br />
file: host programs<br />
desc: added blank line each time "s" is pressed to separate reports for easier viewing<br />
trac: #14<br />
<br />
type: feature<br />
file: host programs<br />
desc: for salted algorithms, report the number of words tried per second, not crypts<br />
trac: #24<br />
<br />
type: feature<br />
file: host programs<br />
desc: brought back special VCL binaries - VCL 1.18 doesnt work that transparently as required<br />
trac: #33<br />
<br />
type: feature<br />
file: host programs<br />
desc: added shortcut for --gpu-loops, you can use -u now as well<br />
trac: #39<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in thread handling that can lead to progress more than 100%<br />
trac: #9<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in case one uses a rule in -j or -k which is invalid or produces rejects<br />
trac: #37<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in dictionary-stats handling in case more than 1000 entries have been added<br />
trac: #38<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in rule-engine (slow hashes) in Dx function<br />
trac: #52<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in user-defined charset if using to many predefined variables<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in in case user specified to many wordlists or to long paths to wordlists</code></div></div><br />
<br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-lite in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.1 (new GPU architectures: Oland, Cats, Raccoons)<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.8<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia sm_35 gpu-architecture [ Tesla K20* ]<br />
<br />
type: feature<br />
file: kernels<br />
desc: removed -m 1900 = SL3<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5100 = Half MD5<br />
trac: #6<br />
<br />
type: feature<br />
file: host programs<br />
desc: brought back special VCL binaries - VCL 1.18 doesnt work that transparently as required<br />
trac: #33<br />
<br />
type: feature<br />
file: host programs<br />
desc: added shortcut for --gpu-loops, you can use -u now as well<br />
trac: #39<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --status and --status-timer for automatic status-display updates without pressing "s"<br />
trac: #4<br />
<br />
type: feature<br />
file: host programs<br />
desc: added blank line each time "s" is pressed to separate reports for easier viewing<br />
trac: #14<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in user-defined charset if using to many predefined variables</code></div></div><br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
This update is about:<br />
<ul class="mycode_list"><li>Support for new drivers<br />
</li>
<li>Support for new algorithms<br />
</li>
<li>Support for new GPU types<br />
</li>
<li>Bugfixes<br />
</li>
</ul>
Based on what user reported on our new tracker: <a href="http://hashcat.net/trac/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/trac/</a> - Thanks guys!<br />
<br />
Download it here:<br />
<br />
oclHashcat-plus: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
oclHashcat-lite: <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-lite/</a><br />
<br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-plus in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.1 (new GPU architectures: Oland, Cats, Raccoons)<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.8<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia sm_35 gpu-architecture [ Tesla K20* ]<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5100 = Half MD5<br />
trac: #6<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5200 = Password Safe SHA-256<br />
trac: #19<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5300 = IKE-PSK MD5<br />
trac: #5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5400 = IKE-PSK SHA1<br />
trac: #5<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --status and --status-timer for automatic status-display updates without pressing "s"<br />
trac: #4<br />
<br />
type: feature<br />
file: host programs<br />
desc: when using the --show or the --left switch make use of --outfile in case user specified it<br />
trac: #12<br />
<br />
type: feature<br />
file: host programs<br />
desc: added percentage of recovered hashes / salts in status-display<br />
trac: #13<br />
<br />
type: feature<br />
file: host programs<br />
desc: added blank line each time "s" is pressed to separate reports for easier viewing<br />
trac: #14<br />
<br />
type: feature<br />
file: host programs<br />
desc: for salted algorithms, report the number of words tried per second, not crypts<br />
trac: #24<br />
<br />
type: feature<br />
file: host programs<br />
desc: brought back special VCL binaries - VCL 1.18 doesnt work that transparently as required<br />
trac: #33<br />
<br />
type: feature<br />
file: host programs<br />
desc: added shortcut for --gpu-loops, you can use -u now as well<br />
trac: #39<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in thread handling that can lead to progress more than 100%<br />
trac: #9<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in case one uses a rule in -j or -k which is invalid or produces rejects<br />
trac: #37<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in dictionary-stats handling in case more than 1000 entries have been added<br />
trac: #38<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in rule-engine (slow hashes) in Dx function<br />
trac: #52<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in user-defined charset if using to many predefined variables<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in in case user specified to many wordlists or to long paths to wordlists</code></div></div><br />
<br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-lite in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.1 (new GPU architectures: Oland, Cats, Raccoons)<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.8<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia sm_35 gpu-architecture [ Tesla K20* ]<br />
<br />
type: feature<br />
file: kernels<br />
desc: removed -m 1900 = SL3<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5100 = Half MD5<br />
trac: #6<br />
<br />
type: feature<br />
file: host programs<br />
desc: brought back special VCL binaries - VCL 1.18 doesnt work that transparently as required<br />
trac: #33<br />
<br />
type: feature<br />
file: host programs<br />
desc: added shortcut for --gpu-loops, you can use -u now as well<br />
trac: #39<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --status and --status-timer for automatic status-display updates without pressing "s"<br />
trac: #4<br />
<br />
type: feature<br />
file: host programs<br />
desc: added blank line each time "s" is pressed to separate reports for easier viewing<br />
trac: #14<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in user-defined charset if using to many predefined variables</code></div></div><br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.10 and oclHashcat-lite v0.11]]></title>
			<link>https://hashcat.net/forum/thread-1876.html</link>
			<pubDate>Mon, 31 Dec 2012 15:21:08 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1876.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
I have decided to do a dual-release of both oclHashcat-plus v0.10 and oclHashcat-lite v0.11. <br />
<br />
That is because both programs share many of the changes that have been done in the last months.<br />
The most time I spend adding two major features to oclHashcat-plus (see changes below).<br />
They could also enable me to move the high-speed brute-force from oclHashcat-lite into oclHashcat-plus in the next version.<br />
Chances that this plan will work out are high. If it does, it would enable me to fusion oclHashcat-plus and oclHashcat-lite into a single one.<br />
<br />
My original plan for this release was to wait for a more recent catalyst driver, since this is what most of us use.<br />
But the new year and the timebomb forces me to release this sooner as expected. Thats why there is a small number of known bugs left.<br />
<br />
Download it here:<br />
<br />
oclHashcat-plus: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
oclHashcat-lite: <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-lite/</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">mixed gpu types</span>.<br />
<br />
Previous versions of oclHashcat-plus required a homogeneous computing environment, in which not only were all GPUs required to be of the same model, but were forced to run at the same clock speed as well. Version 0.10 introduces the possibility of heterogeneous computing environments with both mixed models and mixed clock speeds, thanks to a custom workload dispatcher which replaces the dispatcher in the OpenCL runtime.<br />
<br />
This is a major win for VCL users, as it promotes adding cluster nodes with any supported GPU. This also provides a path for future versions to support the parallel use of other devices, such as CPUs or FPGAs.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://hashcat.net/forum/thread-1542.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1542.html</a><br />
<a href="http://hashcat.net/forum/thread-1478.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1478.html</a><br />
<a href="http://hashcat.net/forum/thread-1395.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1395.html</a><br />
<a href="http://hashcat.net/forum/thread-1154.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1154.html</a><br />
<a href="http://hashcat.net/forum/thread-1233.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1233.html</a><br />
<a href="http://hashcat.net/forum/thread-1047.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1047.html</a><br />
<a href="http://hashcat.net/forum/thread-893.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-893.html</a><br />
<a href="http://hashcat.net/forum/thread-608.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-608.html</a><br />
<a href="http://hashcat.net/forum/thread-376.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-376.html</a><br />
<a href="http://hashcat.net/forum/thread-297.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-297.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">restore/resume</span>.<br />
<br />
Title says it all -- version 0.10 introduces the ability to restore and resume halted sessions. oclHashcat-lite users are already familiar with this feature.<br />
<br />
If you wish to restore a session after a graceful or ungraceful shutdown, simply restart oclHashcat-plus with the --restore parameter:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>./oclHashcat-plus64.bin --restore</code></div></div><br />
To support this feature, a state file is periodically written which saves your session and its current progress. This file is named "oclHashcat-plus.restore" by default, but can be renamed using the --session parameter detailed in the next section. This file is written every 60 seconds by default, but you may tune the timer using the "--restore-timer &lt;seconds&gt;" parameter. The state file is also written upon graceful shutdown (e.g. user presses ^C or 'q' to halt the program), so that your most recent progress is saved upon exit. This file is automatically cleaned up when all hashes have been recovered or the keyspace for an attack has been exhausted.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://hashcat.net/forum/thread-1524.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1524.html</a><br />
<a href="http://hashcat.net/forum/thread-1422.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1422.html</a><br />
<a href="http://hashcat.net/forum/thread-1403.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1403.html</a><br />
<a href="http://hashcat.net/forum/thread-1172.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1172.html</a><br />
<a href="http://hashcat.net/forum/thread-1154.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1154.html</a><br />
<a href="http://hashcat.net/forum/thread-990.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-990.html</a><br />
<a href="http://hashcat.net/forum/thread-908.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-908.html</a><br />
<a href="http://hashcat.net/forum/thread-565.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-565.html</a><br />
<a href="http://hashcat.net/forum/thread-244.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-244.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">sessions</span>.<br />
<br />
The introduction of restore/resume support also introduces the challenge of running multiple concurrent instances of oclHashcat-plus, as each instance would attempt to store its progress to the same restore file. This challenge has been addressed by adding support for named sessions.<br />
<br />
When using the "--session &lt;name&gt;" parameter, each instance writes its progress to its own restore file, rather than the default restore file. To restore a named session, simply tell oclHashcat-plus which session to restore:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>./oclHashcat-plus64.bin --restore --session mysession</code></div></div><br />
A named session can also be created from a default session upon exiting oclHashcat-plus. For example, if you start oclHashcat-plus without the --session parameter and later choose to exit the application to work on a more important job, you can stop the process by pressing 'q' like normal, and rename "oclHashcat-plus.restore" to "&lt;session_name&gt;.restore" before running the other job. This will allow you to resume your previous job using "--session &lt;session_name&gt;" at a later time.<br />
<br />
<hr class="mycode_hr" />
<br />
Support added for new <span style="font-weight: bold;" class="mycode_b">SHA-3</span> algorithm.<br />
<br />
On Oct 3, 2012, NIST selected Keccak as the winner of the SHA-3 competition. Two days later I added it to Hashcat, making Hashcat the first password recovery tool to support SHA-3. It is now being introduced in oclHashcat-plus as well.<br />
<br />
NOTE: SHA-3 has the potential to support up to four specific variants in the future: SHA-3 224, SHA-3 256, SHA-3 384 and SHA-3 512. For the time being, only SHA-3 512 will be implemented.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://twitter.com/hashcat/status/253462812620361728" target="_blank" rel="noopener" class="mycode_url">http://twitter.com/hashcat/status/253462812620361728</a><br />
<a href="http://twitter.com/hashcat/status/253865680426893313" target="_blank" rel="noopener" class="mycode_url">http://twitter.com/hashcat/status/253865680426893313</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">loading dictionaries in parallel</span> while GPU is cracking.<br />
<br />
In previous versions of oclHashcat-plus, dictionary files were read and parsed during program initialization. This meant that while your dictionary files were being parsed, your GPUs were idle. This lead to the display of two different speeds: "Real c/s," and "GPU c/s." You can read more about that at <a href="http://hashcat.net/wiki/doku.php?id=oclhashcat_plus#what_does_real_cs_and_gpu_cs_mean" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/wiki/doku.php?id=oclh...pu_cs_mean</a><br />
<br />
But you do not need to think about that any longer. It is history now.<br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">autotuning</span>.<br />
<br />
There is this magical -n parameter. I know you often use it, but you can also misuse it. You know the higher you set it, the faster it cracks (and the more the screen lags). But there is this (rare) case in which you can actually make it slower by setting it too high.<br />
<br />
A little mathematical background (skip if you don't care):<br />
<br />
The number of workload oclHashcat-plus chooses for a GPU is:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Number-of-processors * Number-of-optimal-threads *<br />
Number-of-optimal-vectorsize * Value-of-n-parameter</code></div></div><br />
Now imagine the result of such a calculation is 8000000 and you set -n 80. The thing I call base-power of your GPU (the part you can not tune) is 100000. On the other hand we have the keyspace we want to search. For example we have a mask ?d?d?d?d?d?d?d?d. That makes the keyspace = 100000000 (10^8). So we have 100000000 / 8000000 = 12.5. That's fine, we can call the kernel 12.5 (actually 13) times before the keyspace is exhausted.<br />
<br />
Now imagine you have two cards of that speed. We add up the power and get 8000000 * 2 = 16000000. This time we have 100000000 / 16000000 = 6.25. That's still fine, both GPU are called 6.25 times. Now what happens if we set from -n 80 to -n 800? Right, the GPU power jumps from 16000000 to 160000000. So we have 100000000 / 160000000 = 0,625. Because this value is smaller than 1, the dispatcher can not assign enough work to both GPU. One of both GPU will not get used at all.<br />
<br />
This demonstrates a case when using too high of a -n value will crack slower than a lower -n value. If you ever wondered why not all your GPUs are used, this might be the cause.<br />
<br />
The new autotune function helps you with that. It cannot be disabled -- it will automatically tune down your -n amplifier in case you set it too high.<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">dictionary word counter cache</span>.<br />
<br />
This is simple to explain: it is necessary to know the number of words inside a dictionary in order to calculate the ETC in the status display, as the keyspace is dimensioned based on the number of words.<br />
<br />
When oclHashcat-plus starts and you use an attack using a dictionary, you see it parsing the dictionary before starting the attack itself. This can take a bit of time and can become very annoying; plus, most of the time the dictionary has not changed since the last time it was loaded.<br />
<br />
So what oclHashcat-plus is doing is that it reads the dictionary only one time and then stores the number of words into the cache files hashcat.dictstat in oclHashcat-plus installation directory. In case the dictionary did not change (checked by comparing mtime, filesize etc) in a later attack, this cache file is used as reference for the word count instead of parsing the dictionary again.<br />
<br />
This reduces the startup time a lot, especially if you focus fast attacks.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://hashcat.net/forum/thread-1711.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1711.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-plus in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 5000 = SHA-3(Keccak)<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed -m 1100 = DCC, mscash (NVidia only) in case of -a 3 against multiple hashes<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare 304.51<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for mixed GPU types<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for restore/resume <br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for sessions<br />
<br />
type: feature<br />
file: host programs<br />
desc: added autotune function in case user choosed to high value for the --gpu-accel amplifier<br />
<br />
type: feature<br />
file: host programs<br />
desc: added timestamps like [Thu Nov&nbsp;&nbsp;8 13:05:59 2012] to timers in status display<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for loading dictionary in parallel while gpu is cracking<br />
<br />
type: feature<br />
file: host programs<br />
desc: added dictionary word counter cache<br />
<br />
type: feature<br />
file: host programs<br />
desc: doubled dictionary word counter performance on startup<br />
<br />
type: feature<br />
file: host programs<br />
desc: if default-mask is used increment mode is automatically turned on<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed special VCL binaries - Not longer required since VCL 1.16 works transparently<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed file-globbing on cmdline for windows<br />
cred: Mem5<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed Segmentation fault (core dump) on --show and --left<br />
cred: splash, undeath<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed --increment-min was ignored<br />
cred: Kgx Pnqvhm<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug that made length 6 masks faster than length 7 masks</code></div></div><br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-lite in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 5000 = SHA-3(Keccak)<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare 304.51<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 5.0<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.7<br />
<br />
type: feature<br />
file: host programs<br />
desc: added timestamps like [Thu Nov&nbsp;&nbsp;8 13:05:59 2012] to timers in status display<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed special VCL binaries - Not longer required since VCL 1.16 works transparently<br />
<br />
type: change<br />
file: host program<br />
desc: updated exit status code, see status_codes.txt for details<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: add ?a to built-in charsets as ?l?u?d?s<br />
cred: m4tr1x<br />
<br />
type: improvement<br />
file: kernels<br />
desc: performance increase in sha512 kernels with password len &lt; 16<br />
cred: m4tr1x</code></div></div><br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
I have decided to do a dual-release of both oclHashcat-plus v0.10 and oclHashcat-lite v0.11. <br />
<br />
That is because both programs share many of the changes that have been done in the last months.<br />
The most time I spend adding two major features to oclHashcat-plus (see changes below).<br />
They could also enable me to move the high-speed brute-force from oclHashcat-lite into oclHashcat-plus in the next version.<br />
Chances that this plan will work out are high. If it does, it would enable me to fusion oclHashcat-plus and oclHashcat-lite into a single one.<br />
<br />
My original plan for this release was to wait for a more recent catalyst driver, since this is what most of us use.<br />
But the new year and the timebomb forces me to release this sooner as expected. Thats why there is a small number of known bugs left.<br />
<br />
Download it here:<br />
<br />
oclHashcat-plus: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
oclHashcat-lite: <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-lite/</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">mixed gpu types</span>.<br />
<br />
Previous versions of oclHashcat-plus required a homogeneous computing environment, in which not only were all GPUs required to be of the same model, but were forced to run at the same clock speed as well. Version 0.10 introduces the possibility of heterogeneous computing environments with both mixed models and mixed clock speeds, thanks to a custom workload dispatcher which replaces the dispatcher in the OpenCL runtime.<br />
<br />
This is a major win for VCL users, as it promotes adding cluster nodes with any supported GPU. This also provides a path for future versions to support the parallel use of other devices, such as CPUs or FPGAs.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://hashcat.net/forum/thread-1542.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1542.html</a><br />
<a href="http://hashcat.net/forum/thread-1478.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1478.html</a><br />
<a href="http://hashcat.net/forum/thread-1395.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1395.html</a><br />
<a href="http://hashcat.net/forum/thread-1154.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1154.html</a><br />
<a href="http://hashcat.net/forum/thread-1233.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1233.html</a><br />
<a href="http://hashcat.net/forum/thread-1047.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1047.html</a><br />
<a href="http://hashcat.net/forum/thread-893.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-893.html</a><br />
<a href="http://hashcat.net/forum/thread-608.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-608.html</a><br />
<a href="http://hashcat.net/forum/thread-376.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-376.html</a><br />
<a href="http://hashcat.net/forum/thread-297.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-297.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">restore/resume</span>.<br />
<br />
Title says it all -- version 0.10 introduces the ability to restore and resume halted sessions. oclHashcat-lite users are already familiar with this feature.<br />
<br />
If you wish to restore a session after a graceful or ungraceful shutdown, simply restart oclHashcat-plus with the --restore parameter:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>./oclHashcat-plus64.bin --restore</code></div></div><br />
To support this feature, a state file is periodically written which saves your session and its current progress. This file is named "oclHashcat-plus.restore" by default, but can be renamed using the --session parameter detailed in the next section. This file is written every 60 seconds by default, but you may tune the timer using the "--restore-timer &lt;seconds&gt;" parameter. The state file is also written upon graceful shutdown (e.g. user presses ^C or 'q' to halt the program), so that your most recent progress is saved upon exit. This file is automatically cleaned up when all hashes have been recovered or the keyspace for an attack has been exhausted.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://hashcat.net/forum/thread-1524.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1524.html</a><br />
<a href="http://hashcat.net/forum/thread-1422.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1422.html</a><br />
<a href="http://hashcat.net/forum/thread-1403.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1403.html</a><br />
<a href="http://hashcat.net/forum/thread-1172.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1172.html</a><br />
<a href="http://hashcat.net/forum/thread-1154.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1154.html</a><br />
<a href="http://hashcat.net/forum/thread-990.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-990.html</a><br />
<a href="http://hashcat.net/forum/thread-908.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-908.html</a><br />
<a href="http://hashcat.net/forum/thread-565.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-565.html</a><br />
<a href="http://hashcat.net/forum/thread-244.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-244.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">sessions</span>.<br />
<br />
The introduction of restore/resume support also introduces the challenge of running multiple concurrent instances of oclHashcat-plus, as each instance would attempt to store its progress to the same restore file. This challenge has been addressed by adding support for named sessions.<br />
<br />
When using the "--session &lt;name&gt;" parameter, each instance writes its progress to its own restore file, rather than the default restore file. To restore a named session, simply tell oclHashcat-plus which session to restore:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>./oclHashcat-plus64.bin --restore --session mysession</code></div></div><br />
A named session can also be created from a default session upon exiting oclHashcat-plus. For example, if you start oclHashcat-plus without the --session parameter and later choose to exit the application to work on a more important job, you can stop the process by pressing 'q' like normal, and rename "oclHashcat-plus.restore" to "&lt;session_name&gt;.restore" before running the other job. This will allow you to resume your previous job using "--session &lt;session_name&gt;" at a later time.<br />
<br />
<hr class="mycode_hr" />
<br />
Support added for new <span style="font-weight: bold;" class="mycode_b">SHA-3</span> algorithm.<br />
<br />
On Oct 3, 2012, NIST selected Keccak as the winner of the SHA-3 competition. Two days later I added it to Hashcat, making Hashcat the first password recovery tool to support SHA-3. It is now being introduced in oclHashcat-plus as well.<br />
<br />
NOTE: SHA-3 has the potential to support up to four specific variants in the future: SHA-3 224, SHA-3 256, SHA-3 384 and SHA-3 512. For the time being, only SHA-3 512 will be implemented.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://twitter.com/hashcat/status/253462812620361728" target="_blank" rel="noopener" class="mycode_url">http://twitter.com/hashcat/status/253462812620361728</a><br />
<a href="http://twitter.com/hashcat/status/253865680426893313" target="_blank" rel="noopener" class="mycode_url">http://twitter.com/hashcat/status/253865680426893313</a><br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">loading dictionaries in parallel</span> while GPU is cracking.<br />
<br />
In previous versions of oclHashcat-plus, dictionary files were read and parsed during program initialization. This meant that while your dictionary files were being parsed, your GPUs were idle. This lead to the display of two different speeds: "Real c/s," and "GPU c/s." You can read more about that at <a href="http://hashcat.net/wiki/doku.php?id=oclhashcat_plus#what_does_real_cs_and_gpu_cs_mean" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/wiki/doku.php?id=oclh...pu_cs_mean</a><br />
<br />
But you do not need to think about that any longer. It is history now.<br />
<br />
<hr class="mycode_hr" />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">autotuning</span>.<br />
<br />
There is this magical -n parameter. I know you often use it, but you can also misuse it. You know the higher you set it, the faster it cracks (and the more the screen lags). But there is this (rare) case in which you can actually make it slower by setting it too high.<br />
<br />
A little mathematical background (skip if you don't care):<br />
<br />
The number of workload oclHashcat-plus chooses for a GPU is:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Number-of-processors * Number-of-optimal-threads *<br />
Number-of-optimal-vectorsize * Value-of-n-parameter</code></div></div><br />
Now imagine the result of such a calculation is 8000000 and you set -n 80. The thing I call base-power of your GPU (the part you can not tune) is 100000. On the other hand we have the keyspace we want to search. For example we have a mask ?d?d?d?d?d?d?d?d. That makes the keyspace = 100000000 (10^8). So we have 100000000 / 8000000 = 12.5. That's fine, we can call the kernel 12.5 (actually 13) times before the keyspace is exhausted.<br />
<br />
Now imagine you have two cards of that speed. We add up the power and get 8000000 * 2 = 16000000. This time we have 100000000 / 16000000 = 6.25. That's still fine, both GPU are called 6.25 times. Now what happens if we set from -n 80 to -n 800? Right, the GPU power jumps from 16000000 to 160000000. So we have 100000000 / 160000000 = 0,625. Because this value is smaller than 1, the dispatcher can not assign enough work to both GPU. One of both GPU will not get used at all.<br />
<br />
This demonstrates a case when using too high of a -n value will crack slower than a lower -n value. If you ever wondered why not all your GPUs are used, this might be the cause.<br />
<br />
The new autotune function helps you with that. It cannot be disabled -- it will automatically tune down your -n amplifier in case you set it too high.<br />
<br />
<hr class="mycode_hr" />
<br />
<br />
Support added for <span style="font-weight: bold;" class="mycode_b">dictionary word counter cache</span>.<br />
<br />
This is simple to explain: it is necessary to know the number of words inside a dictionary in order to calculate the ETC in the status display, as the keyspace is dimensioned based on the number of words.<br />
<br />
When oclHashcat-plus starts and you use an attack using a dictionary, you see it parsing the dictionary before starting the attack itself. This can take a bit of time and can become very annoying; plus, most of the time the dictionary has not changed since the last time it was loaded.<br />
<br />
So what oclHashcat-plus is doing is that it reads the dictionary only one time and then stores the number of words into the cache files hashcat.dictstat in oclHashcat-plus installation directory. In case the dictionary did not change (checked by comparing mtime, filesize etc) in a later attack, this cache file is used as reference for the word count instead of parsing the dictionary again.<br />
<br />
This reduces the startup time a lot, especially if you focus fast attacks.<br />
<br />
See here for requests/details:<br />
<br />
<a href="http://hashcat.net/forum/thread-1711.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1711.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-plus in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 5000 = SHA-3(Keccak)<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed -m 1100 = DCC, mscash (NVidia only) in case of -a 3 against multiple hashes<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare 304.51<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for mixed GPU types<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for restore/resume <br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for sessions<br />
<br />
type: feature<br />
file: host programs<br />
desc: added autotune function in case user choosed to high value for the --gpu-accel amplifier<br />
<br />
type: feature<br />
file: host programs<br />
desc: added timestamps like [Thu Nov&nbsp;&nbsp;8 13:05:59 2012] to timers in status display<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for loading dictionary in parallel while gpu is cracking<br />
<br />
type: feature<br />
file: host programs<br />
desc: added dictionary word counter cache<br />
<br />
type: feature<br />
file: host programs<br />
desc: doubled dictionary word counter performance on startup<br />
<br />
type: feature<br />
file: host programs<br />
desc: if default-mask is used increment mode is automatically turned on<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed special VCL binaries - Not longer required since VCL 1.16 works transparently<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed file-globbing on cmdline for windows<br />
cred: Mem5<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed Segmentation fault (core dump) on --show and --left<br />
cred: splash, undeath<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed --increment-min was ignored<br />
cred: Kgx Pnqvhm<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug that made length 6 masks faster than length 7 masks</code></div></div><br />
<hr class="mycode_hr" />
<br />
List of changes for oclHashcat-lite in detail:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 5000 = SHA-3(Keccak)<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare 304.51<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 5.0<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.7<br />
<br />
type: feature<br />
file: host programs<br />
desc: added timestamps like [Thu Nov&nbsp;&nbsp;8 13:05:59 2012] to timers in status display<br />
<br />
type: feature<br />
file: host programs<br />
desc: removed special VCL binaries - Not longer required since VCL 1.16 works transparently<br />
<br />
type: change<br />
file: host program<br />
desc: updated exit status code, see status_codes.txt for details<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: add ?a to built-in charsets as ?l?u?d?s<br />
cred: m4tr1x<br />
<br />
type: improvement<br />
file: kernels<br />
desc: performance increase in sha512 kernels with password len &lt; 16<br />
cred: m4tr1x</code></div></div><br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.09]]></title>
			<link>https://hashcat.net/forum/thread-1541.html</link>
			<pubDate>Fri, 07 Sep 2012 14:44:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1541.html</guid>
			<description><![CDATA[We are proud to present oclHashcat-plus v0.09!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Lots of new features and algorithms have been added, and many bugs have been fixed.<br />
<br />
The major changes are:<br />
<ul class="mycode_list"><li>Support for cracking the <span style="font-weight: bold;" class="mycode_b">bcrypt and sha512crypt (&#36;6&#36;)</span> algorithms.<br />
</li>
<li>Support for <span style="font-weight: bold;" class="mycode_b">GPU clustering</span> across multiple LAN hosts via VCL, and an increase to support 128 GPUs.<br />
</li>
<li>Added what we call a <span style="font-weight: bold;" class="mycode_b">Brute-Force++</span> attack (see details for description).<br />
</li>
<li>Increased cracking performance, especially on multi-hash due to <span style="font-weight: bold;" class="mycode_b">partially reversing</span> as you know it from single-hash cracking.<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Lets start with the algorithms added; in this case, the <span style="font-weight: bold;" class="mycode_b">generic types</span>:<br />
<ul class="mycode_list"><li>added -m 10 = md5(pass.salt)<br />
</li>
<li>added -m 20 = md5(salt.pass)<br />
</li>
<li>added -m 30 = md5(unicode(pass).salt)<br />
</li>
<li>added -m 40 = md5(salt.unicode(pass))<br />
</li>
<li>added -m 110 = sha1(pass.salt)<br />
</li>
<li>added -m 120 = sha1(salt.pass)<br />
</li>
<li>added -m 130 = sha1(unicode(pass).salt)<br />
</li>
<li>added -m 140 = sha1(salt.unicode(pass))<br />
</li>
<li>added -m 1410 = sha256(pass.salt)<br />
</li>
<li>added -m 1420 = sha256(salt.pass)<br />
</li>
<li>added -m 1710 = sha512(pass.salt)<br />
</li>
<li>added -m 1720 = sha512(salt.pass)<br />
</li>
</ul>
<br />
They have been added for two reasons.<br />
<br />
1. Because there were many requests by users to add them like here:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1009.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1009.html</a><br />
<a href="http://hashcat.net/forum/thread-1152.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1152.html</a><br />
<a href="http://hashcat.net/forum/thread-1444.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1444.html</a><br />
<a href="http://hashcat.net/forum/thread-474.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-474.html</a><br />
<a href="http://hashcat.net/forum/thread-490.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-490.html</a><br />
<a href="http://hashcat.net/forum/thread-574.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-574.html</a><br />
<a href="http://hashcat.net/forum/thread-577.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-577.html</a><br />
<a href="http://hashcat.net/forum/thread-651.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-651.html</a><br />
<a href="http://hashcat.net/forum/thread-830.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-830.html</a><br />
<a href="http://hashcat.net/forum/thread-833.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-833.html</a><br />
<a href="http://hashcat.net/forum/thread-944.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-944.html</a><br />
<a href="http://hashcat.net/forum/thread-951.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-951.html</a><br />
</li>
</ul>
<br />
2. By adding another feature -- that is, <span style="font-weight: bold;" class="mycode_b">setting the minimum length for a salt to 0</span> -- you can construct your own hashing modes if you exploit the salt by putting some data into the calculation. Since we have support in oclHashcat-plus for --hex-salt, this will make your lives even easier.<br />
<br />
<hr class="mycode_hr" />
<br />
Next one is the <span style="font-weight: bold;" class="mycode_b">bcrypt algorithm</span>.<br />
<br />
Guys, there is not much to say. Just one thing: do not expect too much! This algorithm was designed to run extremly slow on GPUs. It is highly dependant on memory-lookups, and is both salted and iterated. On our hd6990, we can reach 4085/s. This isn't much, but it's still multiple times faster than on CPU.<br />
<br />
Details here:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1219.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1219.html</a><br />
<a href="http://hashcat.net/forum/thread-302.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-302.html</a><br />
<a href="http://hashcat.net/forum/thread-186.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-186.html</a><br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Another algorithm we added was the <span style="font-weight: bold;" class="mycode_b">EPIserver algorithm</span>. These are the hashes stored by the ASP.NET membership provider. For more detailed information about this, have a look here: <a href="http://hashcat.net/forum/thread-987.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-987.html</a><br />
<br />
There are plans to rename this algorithm from EPIserver to something like "asp.net membership provider." For now we will stick to EPIserver, but we will certainly rename this in a later version.<br />
<br />
There was already an interesting blog post about all this here, definitely a good read: <a href="http://www.troyhunt.com/2012/06/our-password-hashing-has-no-clothes.html" target="_blank" rel="noopener" class="mycode_url">http://www.troyhunt.com/2012/06/our-pass...othes.html</a><br />
<br />
<br />
<hr class="mycode_hr" />
<br />
Last but at least, the most impressive addition is the <span style="font-weight: bold;" class="mycode_b">sha512crypt algorithm</span>, aka &#36;6&#36;, which is used in nearly all Linux distributions by default. <br />
<br />
Like all crypt(3) algorithms, this is another algorithm which is designed to run slow; plus, it is based on sha512, which uses 64 bit integers. Today's AMD GPUs do not have support for native 64 bit bitwise arithmetics (except shifts), so this is another reason why this algorithm is slow.<br />
<br />
Still, the speedup cracking sha512crypt on GPU versus CPU is much higher compared to bcrypt. My hd6990 gives an impressive 32519/s, which we are very proud of!<br />
<br />
This algorithm was requested here:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-790.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-790.html</a><br />
<a href="http://hashcat.net/forum/thread-736.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-736.html</a><br />
<a href="http://hashcat.net/forum/thread-303.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-303.html</a><br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
The <span style="font-weight: bold;" class="mycode_b">partial reversing</span> of hashes for multi-hash lists differs a bit from classic single-hash reversal, which you are already familiar with if you use oclHashcat-lite. For several reasons, it is not efficient to reverse all hashes that many steps back as in single-hash cracking, and thus we can not reach oclHashcat-lite speed. But, it can still be more efficient than just traditional early checks.<br />
<br />
To visualize this, here made some graphs:<br />
<br />
<img src="http://hashcat.net/misc/p009_img/plus89_mh18.png" loading="lazy"  alt="[Image: plus89_mh18.png]" class="mycode_img" /><br />
<br />
<img src="http://hashcat.net/misc/p009_img/plus89_mh915.png" loading="lazy"  alt="[Image: plus89_mh915.png]" class="mycode_img" /><br />
<br />
You can see that the less hashes you have, the more efficient it is. The curves on Nvidia are a bit sharper. <br />
<br />
Whenever you run brute force on multiple MD4, NTLM or MD5 hashes, oclHashcat-plus will use this partial reveral technique. In theory we can port this to salted hashes as well, but multi-hash on a salted hash is a bad idea. So for now, we stick to raw and reversable algorithms.<br />
<br />
<hr class="mycode_hr" />
<br />
Another nice thing that came up lately is the <span style="font-weight: bold;" class="mycode_b">Virtual OpenCL Cluster Platform</span> (VCL) project. When thorsheim and epixoip informed us about this project in this post <a href="http://hashcat.net/forum/thread-1473.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1473.html</a> it was totally not working with oclHashcat-*, nor any other OpenCL-based password cracker. But, we got in contact with the developers at MOSIX, and after some debugging and trace sessions, we were able to pinpoint the problems. MOSIX then released VCL version 1.15 which addressed these issues.<br />
<br />
The overhead produced by the network agents is very low. This is one of the most important factors for a distributed solution. I made some stats on this here:<br />
<br />
<img src="http://hashcat.net/misc/p009_img/vcltable.png" loading="lazy"  alt="[Image: vcltable.png]" class="mycode_img" /><br />
<br />
<br />
VCL is intended to be used on dedicated LANs or with High Speed Interconnects. I would not recommend clustering nodes over the Internet, as both latency and bandwidth would be an issue.<br />
<br />
Development for VCL support is still in its infancy, but I've tested it with 22 GPUs and it worked well. Installing and configuring VCL is outside the scope of these release notes, but I plan to write a form post on this topic soon. However, there is no magic required to get VCL running on your own.<br />
<br />
To better support VCL, we have increased the maximum number of GPUs from 16 to 128. We do not know for a fact if VCL can handle 128 GPUs, but it works with at least 22 GPUs.<br />
<br />
Another nice thing about this is that it works around the 8-GPU limitation in AMD's drivers and Xorg. Since VCL does not require X to run, you can build giant GPU clusters this way.<br />
<br />
<hr class="mycode_hr" />
<br />
Something that already was included in the newer versions of oclHashcate-lite is the support for markov-chains.<br />
<br />
It does not matter if you do simple Brute-Force attack using -a 3 or you do a dictionary based Hybrid-Attack using either -a 6 or -a 7. This enhancement is automatically used EVERY time you use a mask.<br />
<br />
A little background on this, as if you do not use oclHashcat-lite you might not know:<br />
<br />
The markov-attack is a statistically based brute-force like attack, but instead of specifying a charset or a mask, we specify a file that was generated once in a previous step. It contains statistical information which is made out of an automated analysis of a given dictionary.<br />
<br />
It can fully replace Brute-Force since it covers the full keyspace.<br />
<br />
In Brute-Force Attack (or in Mask Attack) we can limit the keyspace by setting a smaller charset in order to reduce the attack-time. In Markov Attack we have something similar, the "threshold". All you do is to specify a number. The higher the number, the higher the threshold to add a new link between two characters on the two-level table on which the markov-attack is based on.<br />
<br />
The background is not so important -- just remember that the lower the value, the smaller the keyspace, and thus the faster the attack is.<br />
<br />
But if you take a close look on it, the technical correct description would be: "Brute-Force attack enhanced by per-position markov-chains built out of wordlists for statistics with the ability to use filters using a mask". OK? That required some special naming, and since it's 100% replacing Brute Force, we made it simple for ourselves and called it <span style="font-weight: bold;" class="mycode_b">Brute-Force++</span><br />
<br />
Here is a nice chart that visualizes the efficiency of Brute-Force++:<br />
<br />
<img src="http://hashcat.net/misc/p009_img/bfpp.png" loading="lazy"  alt="[Image: bfpp.png]" class="mycode_img" /><br />
<br />
The original description of how this works can be found here: <br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1291.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1291.html</a><br />
<a href="http://hashcat.net/forum/thread-1285.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1285.html</a><br />
<a href="http://hashcat.net/forum/thread-1265.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1265.html</a><br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Use <span style="font-weight: bold;" class="mycode_b">.ptx ad .llvmir intermediate kernels</span> - from oclHashcat-lite<br />
<br />
The kernels are distributed in an "intermediate" format (aka IL). This format cannot be reversed to its original C code, but is still not a binary format that can be used for execution.<br />
<br />
The JIT (just-in-time) compilers from both OpenCL and CUDA, which ship with the driver, compile the final bytecode out of the IL. This takes a few seconds per kernel, but this is a one-time operation as the bytecode is cached (CUDA does it automatically, OpenCL does not, but we add eda function that emulates CUDA's behavior.)<br />
<br />
This has some nice advantages:<br />
<ul class="mycode_list"><li>Not 32/64 bit specific<br />
</li>
<li>Less HDD space<br />
</li>
<li>Smaller .7z<br />
</li>
<li>Less problems with driver specific problems as we often see with Catalyst <br />
</li>
<li>There is no more need to release a new oclHashcat-* in case a new driver optimization has been added. Cached oclHashcat-* kernels are driver specific. If it recognizes a driver change, it will rebuild the bytecode from the IL, but using the new JIT from the new driver, resulting in driver-specific optimized bytecode.<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Added <span style="font-weight: bold;" class="mycode_b">Retaining GPU temperature</span> - from oclHashcat-lite<br />
<br />
When I started with oclHashcat-* Hardware mangement support, some people asked me for add support for fan-speed. For a long time I was not interessted in adding fan-speed code to oclHashcat-* since this is the job for the driver or some specialized controling software.<br />
<br />
I did not change my mind completly on this, but still we have added some fan-speed controlling code. The new parameters are:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>--gpu-temp-disable&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Disable temperature and fanspeed readings and triggers<br />
--gpu-temp-abort=NUM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Abort session if GPU temperature reaches NUM degrees celsius<br />
--gpu-temp-retain=NUM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Try to retain GPU temperature at NUM degrees celsius (AMD only)</code></div></div><br />
So what this does is, if the temperature configured with the new --gpu-temp-retain parameter is reached, it starts to increase the fan-speed by 1 percent each second. Thats all. In practice, this means is it enables you to enfore a very specific operating temperature for your GPUs.<br />
<br />
Some notes:<br />
<ul class="mycode_list"><li>--gpu-temp-disable you can completly disable all the temperature stuff.<br />
</li>
<li>--gpu-temp-retain currently only works for AMD.<br />
</li>
<li>--gpu-temp-abort parameter is just the renamed version of the old --gpu-watchdog.<br />
</li>
<li>Both parameters accept the 0 value which disables only this specific feature. This means you can step back to the old behavior by specifying --gpu-temp-retain 0.<br />
</li>
<li>The default for --gpu-temp-abort is still 90c.<br />
</li>
<li>The default for --gpu-temp-retain is 80c.<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
More implemented feature requestes on forum:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1303.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1303.html</a> - Increment-mode for Brute Force<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1065.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1065.html</a> - OpenLDAP SSHA's Dynamic Base64 Parser<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1335.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1335.html</a> - Implement command line rules for plus<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1263.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1263.html</a> - Add Charset ?a<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1140.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1140.html</a> - Hashcat Exit Statuses<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1043.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1043.html</a> - Next Dictionary In Line <br />
</li>
</ul>
<br />
More implemented feature requestes on PM / IRC / Email:<br />
<ul class="mycode_list"><li>Default-mask for -a 3 mode from oclHashcat-lite v0.10<br />
</li>
<li>Commandline switch --disable-potfile feature from hashcat v0.40<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
This new version has been tested by many beta testers on a wide variety of hardware and operating systems.<br />
<br />
All new features were available to beta tester for several weeks. All we did for the last few weeks was perform both automated and manual tests of all features and algorithms, until all issues were 100% fixed.<br />
<br />
We want to say a special thank-you to the following beta-testers for their massive support during development:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/user-1746.html" target="_blank" rel="noopener" class="mycode_url">epixoip</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-174.html" target="_blank" rel="noopener" class="mycode_url">blandyuk</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-963.html" target="_blank" rel="noopener" class="mycode_url">forumhero</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-1577.html" target="_blank" rel="noopener" class="mycode_url">M@LIK</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-6.html" target="_blank" rel="noopener" class="mycode_url">mastercracker</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-39.html" target="_blank" rel="noopener" class="mycode_url">proinside</a><br />
</li>
</ul>
<br />
This is great proof of how the cracking community is working together, regardless of what team they are on.<br />
<br />
Of course we want to say thanks to all the beta testers who helped finding bugs and suggesting things as well -- Thanks!<br />
<br />
--<br />
atom and matrix<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
Full changelog:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 10 = md5(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 20 = md5(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 30 = md5(unicode(pass).salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 40 = md5(salt.unicode(pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 110 = sha1(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 120 = sha1(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 130 = sha1(unicode(pass).salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 140 = sha1(salt.unicode(pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 141 = EPiServer 6.x<br />
cred: thorsheim<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1410 = sha256(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1420 = sha256(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1710 = sha512(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1720 = sha512(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1800 = sha512crypt, SHA512(Unix)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 3200 = bcrypt<br />
<br />
type: feature<br />
file: kernels<br />
desc: removed -a 4 permutation attack (use rules and combinator-attack instead)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash MD5 if running in -a 3 mode and mask &lt; length 9<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash MD4 if running in -a 3 mode and mask &lt; length 13<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash NTLM if running in -a 3 mode and mask &lt; length 9<br />
<br />
type: feature<br />
file: kernels<br />
desc: on AMD, switched from .kernel to .llvmir to reduce diskspace<br />
<br />
type: feature<br />
file: kernels<br />
desc: on NV, switched from .cubin to .ptx to reduce diskspace<br />
<br />
type: feature<br />
file: kernels<br />
desc: added kernel cache to avoid unnecessary recompilation<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: kernels<br />
desc: brought back support for AMD hd4xxx GPUS due to .llvmir integration<br />
<br />
type: feature<br />
file: kernels<br />
desc: optimized 0x80 handling; +3.6% speed in combinator- and hybrid-attack<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for Virtual OpenCL (VCL) Cluster Platform VCL 1.15<br />
cred: epixoip<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for up to 128 GPUS<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported markov-attack from oclHashcat-lite v0.10<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported increment-mode from oclHashcat-lite v0.10<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported default-mask from oclHashcat-lite v0.10<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported -j and -k single rules from oclHashcat v0.27<br />
<br />
type: feature<br />
file: host programs<br />
desc: allowed zero-length salts in the generic algorithms makes it more easy to exploit them<br />
<br />
type: feature<br />
file: host programs<br />
desc: added next-dictionary-in-line feature to skip inefficient dictionaries on keypress<br />
<br />
type: feature<br />
file: host programs<br />
desc: implemented base64 parser that would allow for dynamic salt lengths in nsldaps<br />
<br />
type: feature<br />
file: host programs<br />
desc: worked around memory allocation limit, you can load twice as much hashes in multihash<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 5.0<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.7<br />
<br />
type: driver<br />
file: host programs<br />
desc: added support for NVidia NVML library and got rid of nvidia-smi command<br />
<br />
type: feature<br />
file: host programs<br />
desc: splitted --gpu-watchdog to --gpu-temp-disable and --gpu-temp-abort<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --gpu-temp-retain to try retain temperature at NUM degrees celsius<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: worked around AMD bug in clGetDeviceInfo() CL_DEVICE_MAX_CLOCK_FREQUENCY<br />
cred: m4tr1x<br />
<br />
type: change<br />
file: host program<br />
desc: updated exit status code, see status_codes.txt for details<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --disable-potfile feature from hashcat v0.41<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: add ?a to built-in charsets as ?l?u?d?s<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: added fan-speeds to status display<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in host program for WPA/WPA2 in -a 1, -a 6 and -a 7 mode<br />
cred: bjorn<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed a bug in kernel for WPA/WPA2 on AMD VLIW architecture leading to code not found<br />
cred: DrGeek<br />
<br />
type: change<br />
file: contact.txt<br />
desc: updated contact information (moved to freenode IRC)</code></div></div>]]></description>
			<content:encoded><![CDATA[We are proud to present oclHashcat-plus v0.09!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Lots of new features and algorithms have been added, and many bugs have been fixed.<br />
<br />
The major changes are:<br />
<ul class="mycode_list"><li>Support for cracking the <span style="font-weight: bold;" class="mycode_b">bcrypt and sha512crypt (&#36;6&#36;)</span> algorithms.<br />
</li>
<li>Support for <span style="font-weight: bold;" class="mycode_b">GPU clustering</span> across multiple LAN hosts via VCL, and an increase to support 128 GPUs.<br />
</li>
<li>Added what we call a <span style="font-weight: bold;" class="mycode_b">Brute-Force++</span> attack (see details for description).<br />
</li>
<li>Increased cracking performance, especially on multi-hash due to <span style="font-weight: bold;" class="mycode_b">partially reversing</span> as you know it from single-hash cracking.<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Lets start with the algorithms added; in this case, the <span style="font-weight: bold;" class="mycode_b">generic types</span>:<br />
<ul class="mycode_list"><li>added -m 10 = md5(pass.salt)<br />
</li>
<li>added -m 20 = md5(salt.pass)<br />
</li>
<li>added -m 30 = md5(unicode(pass).salt)<br />
</li>
<li>added -m 40 = md5(salt.unicode(pass))<br />
</li>
<li>added -m 110 = sha1(pass.salt)<br />
</li>
<li>added -m 120 = sha1(salt.pass)<br />
</li>
<li>added -m 130 = sha1(unicode(pass).salt)<br />
</li>
<li>added -m 140 = sha1(salt.unicode(pass))<br />
</li>
<li>added -m 1410 = sha256(pass.salt)<br />
</li>
<li>added -m 1420 = sha256(salt.pass)<br />
</li>
<li>added -m 1710 = sha512(pass.salt)<br />
</li>
<li>added -m 1720 = sha512(salt.pass)<br />
</li>
</ul>
<br />
They have been added for two reasons.<br />
<br />
1. Because there were many requests by users to add them like here:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1009.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1009.html</a><br />
<a href="http://hashcat.net/forum/thread-1152.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1152.html</a><br />
<a href="http://hashcat.net/forum/thread-1444.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1444.html</a><br />
<a href="http://hashcat.net/forum/thread-474.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-474.html</a><br />
<a href="http://hashcat.net/forum/thread-490.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-490.html</a><br />
<a href="http://hashcat.net/forum/thread-574.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-574.html</a><br />
<a href="http://hashcat.net/forum/thread-577.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-577.html</a><br />
<a href="http://hashcat.net/forum/thread-651.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-651.html</a><br />
<a href="http://hashcat.net/forum/thread-830.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-830.html</a><br />
<a href="http://hashcat.net/forum/thread-833.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-833.html</a><br />
<a href="http://hashcat.net/forum/thread-944.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-944.html</a><br />
<a href="http://hashcat.net/forum/thread-951.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-951.html</a><br />
</li>
</ul>
<br />
2. By adding another feature -- that is, <span style="font-weight: bold;" class="mycode_b">setting the minimum length for a salt to 0</span> -- you can construct your own hashing modes if you exploit the salt by putting some data into the calculation. Since we have support in oclHashcat-plus for --hex-salt, this will make your lives even easier.<br />
<br />
<hr class="mycode_hr" />
<br />
Next one is the <span style="font-weight: bold;" class="mycode_b">bcrypt algorithm</span>.<br />
<br />
Guys, there is not much to say. Just one thing: do not expect too much! This algorithm was designed to run extremly slow on GPUs. It is highly dependant on memory-lookups, and is both salted and iterated. On our hd6990, we can reach 4085/s. This isn't much, but it's still multiple times faster than on CPU.<br />
<br />
Details here:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1219.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1219.html</a><br />
<a href="http://hashcat.net/forum/thread-302.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-302.html</a><br />
<a href="http://hashcat.net/forum/thread-186.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-186.html</a><br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Another algorithm we added was the <span style="font-weight: bold;" class="mycode_b">EPIserver algorithm</span>. These are the hashes stored by the ASP.NET membership provider. For more detailed information about this, have a look here: <a href="http://hashcat.net/forum/thread-987.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-987.html</a><br />
<br />
There are plans to rename this algorithm from EPIserver to something like "asp.net membership provider." For now we will stick to EPIserver, but we will certainly rename this in a later version.<br />
<br />
There was already an interesting blog post about all this here, definitely a good read: <a href="http://www.troyhunt.com/2012/06/our-password-hashing-has-no-clothes.html" target="_blank" rel="noopener" class="mycode_url">http://www.troyhunt.com/2012/06/our-pass...othes.html</a><br />
<br />
<br />
<hr class="mycode_hr" />
<br />
Last but at least, the most impressive addition is the <span style="font-weight: bold;" class="mycode_b">sha512crypt algorithm</span>, aka &#36;6&#36;, which is used in nearly all Linux distributions by default. <br />
<br />
Like all crypt(3) algorithms, this is another algorithm which is designed to run slow; plus, it is based on sha512, which uses 64 bit integers. Today's AMD GPUs do not have support for native 64 bit bitwise arithmetics (except shifts), so this is another reason why this algorithm is slow.<br />
<br />
Still, the speedup cracking sha512crypt on GPU versus CPU is much higher compared to bcrypt. My hd6990 gives an impressive 32519/s, which we are very proud of!<br />
<br />
This algorithm was requested here:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-790.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-790.html</a><br />
<a href="http://hashcat.net/forum/thread-736.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-736.html</a><br />
<a href="http://hashcat.net/forum/thread-303.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-303.html</a><br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
The <span style="font-weight: bold;" class="mycode_b">partial reversing</span> of hashes for multi-hash lists differs a bit from classic single-hash reversal, which you are already familiar with if you use oclHashcat-lite. For several reasons, it is not efficient to reverse all hashes that many steps back as in single-hash cracking, and thus we can not reach oclHashcat-lite speed. But, it can still be more efficient than just traditional early checks.<br />
<br />
To visualize this, here made some graphs:<br />
<br />
<img src="http://hashcat.net/misc/p009_img/plus89_mh18.png" loading="lazy"  alt="[Image: plus89_mh18.png]" class="mycode_img" /><br />
<br />
<img src="http://hashcat.net/misc/p009_img/plus89_mh915.png" loading="lazy"  alt="[Image: plus89_mh915.png]" class="mycode_img" /><br />
<br />
You can see that the less hashes you have, the more efficient it is. The curves on Nvidia are a bit sharper. <br />
<br />
Whenever you run brute force on multiple MD4, NTLM or MD5 hashes, oclHashcat-plus will use this partial reveral technique. In theory we can port this to salted hashes as well, but multi-hash on a salted hash is a bad idea. So for now, we stick to raw and reversable algorithms.<br />
<br />
<hr class="mycode_hr" />
<br />
Another nice thing that came up lately is the <span style="font-weight: bold;" class="mycode_b">Virtual OpenCL Cluster Platform</span> (VCL) project. When thorsheim and epixoip informed us about this project in this post <a href="http://hashcat.net/forum/thread-1473.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1473.html</a> it was totally not working with oclHashcat-*, nor any other OpenCL-based password cracker. But, we got in contact with the developers at MOSIX, and after some debugging and trace sessions, we were able to pinpoint the problems. MOSIX then released VCL version 1.15 which addressed these issues.<br />
<br />
The overhead produced by the network agents is very low. This is one of the most important factors for a distributed solution. I made some stats on this here:<br />
<br />
<img src="http://hashcat.net/misc/p009_img/vcltable.png" loading="lazy"  alt="[Image: vcltable.png]" class="mycode_img" /><br />
<br />
<br />
VCL is intended to be used on dedicated LANs or with High Speed Interconnects. I would not recommend clustering nodes over the Internet, as both latency and bandwidth would be an issue.<br />
<br />
Development for VCL support is still in its infancy, but I've tested it with 22 GPUs and it worked well. Installing and configuring VCL is outside the scope of these release notes, but I plan to write a form post on this topic soon. However, there is no magic required to get VCL running on your own.<br />
<br />
To better support VCL, we have increased the maximum number of GPUs from 16 to 128. We do not know for a fact if VCL can handle 128 GPUs, but it works with at least 22 GPUs.<br />
<br />
Another nice thing about this is that it works around the 8-GPU limitation in AMD's drivers and Xorg. Since VCL does not require X to run, you can build giant GPU clusters this way.<br />
<br />
<hr class="mycode_hr" />
<br />
Something that already was included in the newer versions of oclHashcate-lite is the support for markov-chains.<br />
<br />
It does not matter if you do simple Brute-Force attack using -a 3 or you do a dictionary based Hybrid-Attack using either -a 6 or -a 7. This enhancement is automatically used EVERY time you use a mask.<br />
<br />
A little background on this, as if you do not use oclHashcat-lite you might not know:<br />
<br />
The markov-attack is a statistically based brute-force like attack, but instead of specifying a charset or a mask, we specify a file that was generated once in a previous step. It contains statistical information which is made out of an automated analysis of a given dictionary.<br />
<br />
It can fully replace Brute-Force since it covers the full keyspace.<br />
<br />
In Brute-Force Attack (or in Mask Attack) we can limit the keyspace by setting a smaller charset in order to reduce the attack-time. In Markov Attack we have something similar, the "threshold". All you do is to specify a number. The higher the number, the higher the threshold to add a new link between two characters on the two-level table on which the markov-attack is based on.<br />
<br />
The background is not so important -- just remember that the lower the value, the smaller the keyspace, and thus the faster the attack is.<br />
<br />
But if you take a close look on it, the technical correct description would be: "Brute-Force attack enhanced by per-position markov-chains built out of wordlists for statistics with the ability to use filters using a mask". OK? That required some special naming, and since it's 100% replacing Brute Force, we made it simple for ourselves and called it <span style="font-weight: bold;" class="mycode_b">Brute-Force++</span><br />
<br />
Here is a nice chart that visualizes the efficiency of Brute-Force++:<br />
<br />
<img src="http://hashcat.net/misc/p009_img/bfpp.png" loading="lazy"  alt="[Image: bfpp.png]" class="mycode_img" /><br />
<br />
The original description of how this works can be found here: <br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1291.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1291.html</a><br />
<a href="http://hashcat.net/forum/thread-1285.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1285.html</a><br />
<a href="http://hashcat.net/forum/thread-1265.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1265.html</a><br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Use <span style="font-weight: bold;" class="mycode_b">.ptx ad .llvmir intermediate kernels</span> - from oclHashcat-lite<br />
<br />
The kernels are distributed in an "intermediate" format (aka IL). This format cannot be reversed to its original C code, but is still not a binary format that can be used for execution.<br />
<br />
The JIT (just-in-time) compilers from both OpenCL and CUDA, which ship with the driver, compile the final bytecode out of the IL. This takes a few seconds per kernel, but this is a one-time operation as the bytecode is cached (CUDA does it automatically, OpenCL does not, but we add eda function that emulates CUDA's behavior.)<br />
<br />
This has some nice advantages:<br />
<ul class="mycode_list"><li>Not 32/64 bit specific<br />
</li>
<li>Less HDD space<br />
</li>
<li>Smaller .7z<br />
</li>
<li>Less problems with driver specific problems as we often see with Catalyst <br />
</li>
<li>There is no more need to release a new oclHashcat-* in case a new driver optimization has been added. Cached oclHashcat-* kernels are driver specific. If it recognizes a driver change, it will rebuild the bytecode from the IL, but using the new JIT from the new driver, resulting in driver-specific optimized bytecode.<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Added <span style="font-weight: bold;" class="mycode_b">Retaining GPU temperature</span> - from oclHashcat-lite<br />
<br />
When I started with oclHashcat-* Hardware mangement support, some people asked me for add support for fan-speed. For a long time I was not interessted in adding fan-speed code to oclHashcat-* since this is the job for the driver or some specialized controling software.<br />
<br />
I did not change my mind completly on this, but still we have added some fan-speed controlling code. The new parameters are:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>--gpu-temp-disable&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Disable temperature and fanspeed readings and triggers<br />
--gpu-temp-abort=NUM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Abort session if GPU temperature reaches NUM degrees celsius<br />
--gpu-temp-retain=NUM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Try to retain GPU temperature at NUM degrees celsius (AMD only)</code></div></div><br />
So what this does is, if the temperature configured with the new --gpu-temp-retain parameter is reached, it starts to increase the fan-speed by 1 percent each second. Thats all. In practice, this means is it enables you to enfore a very specific operating temperature for your GPUs.<br />
<br />
Some notes:<br />
<ul class="mycode_list"><li>--gpu-temp-disable you can completly disable all the temperature stuff.<br />
</li>
<li>--gpu-temp-retain currently only works for AMD.<br />
</li>
<li>--gpu-temp-abort parameter is just the renamed version of the old --gpu-watchdog.<br />
</li>
<li>Both parameters accept the 0 value which disables only this specific feature. This means you can step back to the old behavior by specifying --gpu-temp-retain 0.<br />
</li>
<li>The default for --gpu-temp-abort is still 90c.<br />
</li>
<li>The default for --gpu-temp-retain is 80c.<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
More implemented feature requestes on forum:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-1303.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1303.html</a> - Increment-mode for Brute Force<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1065.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1065.html</a> - OpenLDAP SSHA's Dynamic Base64 Parser<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1335.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1335.html</a> - Implement command line rules for plus<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1263.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1263.html</a> - Add Charset ?a<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1140.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1140.html</a> - Hashcat Exit Statuses<br />
</li>
<li><a href="http://hashcat.net/forum/thread-1043.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1043.html</a> - Next Dictionary In Line <br />
</li>
</ul>
<br />
More implemented feature requestes on PM / IRC / Email:<br />
<ul class="mycode_list"><li>Default-mask for -a 3 mode from oclHashcat-lite v0.10<br />
</li>
<li>Commandline switch --disable-potfile feature from hashcat v0.40<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
This new version has been tested by many beta testers on a wide variety of hardware and operating systems.<br />
<br />
All new features were available to beta tester for several weeks. All we did for the last few weeks was perform both automated and manual tests of all features and algorithms, until all issues were 100% fixed.<br />
<br />
We want to say a special thank-you to the following beta-testers for their massive support during development:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/user-1746.html" target="_blank" rel="noopener" class="mycode_url">epixoip</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-174.html" target="_blank" rel="noopener" class="mycode_url">blandyuk</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-963.html" target="_blank" rel="noopener" class="mycode_url">forumhero</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-1577.html" target="_blank" rel="noopener" class="mycode_url">M@LIK</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-6.html" target="_blank" rel="noopener" class="mycode_url">mastercracker</a><br />
</li>
<li><a href="http://hashcat.net/forum/user-39.html" target="_blank" rel="noopener" class="mycode_url">proinside</a><br />
</li>
</ul>
<br />
This is great proof of how the cracking community is working together, regardless of what team they are on.<br />
<br />
Of course we want to say thanks to all the beta testers who helped finding bugs and suggesting things as well -- Thanks!<br />
<br />
--<br />
atom and matrix<br />
<br />
<br />
<hr class="mycode_hr" />
<br />
Full changelog:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 10 = md5(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 20 = md5(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 30 = md5(unicode(pass).salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 40 = md5(salt.unicode(pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 110 = sha1(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 120 = sha1(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 130 = sha1(unicode(pass).salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 140 = sha1(salt.unicode(pass))<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 141 = EPiServer 6.x<br />
cred: thorsheim<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1410 = sha256(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1420 = sha256(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1710 = sha512(pass.salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1720 = sha512(salt.pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1800 = sha512crypt, SHA512(Unix)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 3200 = bcrypt<br />
<br />
type: feature<br />
file: kernels<br />
desc: removed -a 4 permutation attack (use rules and combinator-attack instead)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash MD5 if running in -a 3 mode and mask &lt; length 9<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash MD4 if running in -a 3 mode and mask &lt; length 13<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash NTLM if running in -a 3 mode and mask &lt; length 9<br />
<br />
type: feature<br />
file: kernels<br />
desc: on AMD, switched from .kernel to .llvmir to reduce diskspace<br />
<br />
type: feature<br />
file: kernels<br />
desc: on NV, switched from .cubin to .ptx to reduce diskspace<br />
<br />
type: feature<br />
file: kernels<br />
desc: added kernel cache to avoid unnecessary recompilation<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: kernels<br />
desc: brought back support for AMD hd4xxx GPUS due to .llvmir integration<br />
<br />
type: feature<br />
file: kernels<br />
desc: optimized 0x80 handling; +3.6% speed in combinator- and hybrid-attack<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for Virtual OpenCL (VCL) Cluster Platform VCL 1.15<br />
cred: epixoip<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for up to 128 GPUS<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported markov-attack from oclHashcat-lite v0.10<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported increment-mode from oclHashcat-lite v0.10<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported default-mask from oclHashcat-lite v0.10<br />
<br />
type: feature<br />
file: host programs<br />
desc: ported -j and -k single rules from oclHashcat v0.27<br />
<br />
type: feature<br />
file: host programs<br />
desc: allowed zero-length salts in the generic algorithms makes it more easy to exploit them<br />
<br />
type: feature<br />
file: host programs<br />
desc: added next-dictionary-in-line feature to skip inefficient dictionaries on keypress<br />
<br />
type: feature<br />
file: host programs<br />
desc: implemented base64 parser that would allow for dynamic salt lengths in nsldaps<br />
<br />
type: feature<br />
file: host programs<br />
desc: worked around memory allocation limit, you can load twice as much hashes in multihash<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 5.0<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.7<br />
<br />
type: driver<br />
file: host programs<br />
desc: added support for NVidia NVML library and got rid of nvidia-smi command<br />
<br />
type: feature<br />
file: host programs<br />
desc: splitted --gpu-watchdog to --gpu-temp-disable and --gpu-temp-abort<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --gpu-temp-retain to try retain temperature at NUM degrees celsius<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: worked around AMD bug in clGetDeviceInfo() CL_DEVICE_MAX_CLOCK_FREQUENCY<br />
cred: m4tr1x<br />
<br />
type: change<br />
file: host program<br />
desc: updated exit status code, see status_codes.txt for details<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --disable-potfile feature from hashcat v0.41<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: add ?a to built-in charsets as ?l?u?d?s<br />
cred: m4tr1x<br />
<br />
type: feature<br />
file: host programs<br />
desc: added fan-speeds to status display<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a bug in host program for WPA/WPA2 in -a 1, -a 6 and -a 7 mode<br />
cred: bjorn<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed a bug in kernel for WPA/WPA2 on AMD VLIW architecture leading to code not found<br />
cred: DrGeek<br />
<br />
type: change<br />
file: contact.txt<br />
desc: updated contact information (moved to freenode IRC)</code></div></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.09 special version]]></title>
			<link>https://hashcat.net/forum/thread-1245.html</link>
			<pubDate>Thu, 07 Jun 2012 17:10:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1245.html</guid>
			<description><![CDATA[This is a special oclHashcat-plus version.<br />
<br />
Its able to crack the "masked" 3.5mil hashes in your 6.5mil hashlist, use -m 150.<br />
<br />
<a href="http://hashcat.net/files/oclHashcat-plus-0.09_150.7z" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/files/oclHashcat-plus-0.09_150.7z</a>]]></description>
			<content:encoded><![CDATA[This is a special oclHashcat-plus version.<br />
<br />
Its able to crack the "masked" 3.5mil hashes in your 6.5mil hashlist, use -m 150.<br />
<br />
<a href="http://hashcat.net/files/oclHashcat-plus-0.09_150.7z" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/files/oclHashcat-plus-0.09_150.7z</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.081 *HOTFIX*]]></title>
			<link>https://hashcat.net/forum/thread-1151.html</link>
			<pubDate>Tue, 08 May 2012 09:35:59 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1151.html</guid>
			<description><![CDATA[If you are cracking WPA/WPA2 on an AMD GPU which is not of GCN architecture you should upgrade.<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Original discussion is here: <a href="http://hashcat.net/forum/thread-1147.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1147.html</a><br />
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[If you are cracking WPA/WPA2 on an AMD GPU which is not of GCN architecture you should upgrade.<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Original discussion is here: <a href="http://hashcat.net/forum/thread-1147.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1147.html</a><br />
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.08]]></title>
			<link>https://hashcat.net/forum/thread-1133.html</link>
			<pubDate>Tue, 01 May 2012 16:49:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1133.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Welcome to the latest version of the hashcat flagship: <span style="font-weight: bold;" class="mycode_b">oclHashcat-plus</span>.<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
I will go into detail about all the changes shortly, but first let me thank the beta testers and forum members. They do a really great job of sending me bug-reports, benchmarks, suggestions, keeping the wiki up to date, etc. You guys rock! Many thanks for your help!<br />
<br />
There are many new changes and its hard to pick which is the most important one. I will start in no particular order, but limit it to the most interesting changes. The full change-log can be found on the bottom.<br />
<br />
<hr class="mycode_hr" />
<br />
Added support for <span style="font-weight: bold;" class="mycode_b">Catalyst 12.4</span>.<br />
<br />
There is nothing much to say, but this enables the use of the following <span style="font-weight: bold;" class="mycode_b">hd7xxx</span> GPUS:<br />
<ul class="mycode_list"><li>Scrapper: 7350<br />
</li>
<li>Capeverde: 7570, 7670, 7770<br />
</li>
<li>Devastator: 7450, 7550<br />
</li>
<li>Pitcairn: 7850, 7870<br />
</li>
<li>Tahiti: 7950, 7970<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Added support for <span style="font-weight: bold;" class="mycode_b">CUDA 4.2</span>.<br />
<br />
This is interesting for two reasons:<br />
<ul class="mycode_list"><li>Adds support for the sm_30 gpu-architecture, aka Kepler, aka <span style="font-weight: bold;" class="mycode_b">gtx6xx</span><br />
</li>
<li>NVidia switched from GCC to LLVM for kernel compilations, that brings some good automated optimizations.<br />
</li>
</ul>
<br />
I hope there is something more inside sm_30 that I can use for optimization. <br />
<br />
To do this one requires the PTX documentation to be updated.<br />
<br />
<hr class="mycode_hr" />
<br />
I have backported the base <span style="font-weight: bold;" class="mycode_b">SHA-512</span> algorithm to oclHashcat-plus.<br />
<br />
As always, most of the code has been backported from oclHashcat-lite. My favorite way of developing is to: Start implementing on oclHashcat-lite, then collect some user experience and do some optimizations, then backport to oclHashcat-plus.<br />
<br />
It will run slower than you might expect it to (but not that slow). <br />
<br />
Still, it is pretty fast: The hd7970 runs at <span style="text-decoration: underline;" class="mycode_u">72582 khash/s</span>, the gtx570@1600 runs at <span style="text-decoration: underline;" class="mycode_u">71454 khash/s</span>.<br />
<br />
The original request post for the algorithm is here: <a href="http://hashcat.net/forum/thread-992.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-992.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
SHA-512 is also the base hash of the <span style="font-weight: bold;" class="mycode_b">Mac OSX v10.7 Lion</span> hashes.<br />
<br />
Its just salted with random 4 byte data. So I quickly decided to add it since there were several requests on IRC and via Email for it.<br />
<br />
The salt has an optimization impact on the NVidia kernel that actually makes it a bit faster than the raw SHA-512 hash. <br />
<br />
The hd7970 runs at <span style="text-decoration: underline;" class="mycode_u">69894 khash/s</span>, the gtx570@1600 runs at <span style="text-decoration: underline;" class="mycode_u">76266 khash/s</span>.<br />
<br />
But think before you start. These hashes are salted. That means you probably want to limit your attack to a single (but important) one.<br />
<br />
<hr class="mycode_hr" />
<br />
One of the most intrusive changes was the back-porting of the <span style="font-weight: bold;" class="mycode_b">GPU-based password candidate generator</span> from oclHashcat-lite v0.09.<br />
<br />
This greatly reduces the CPU load and the bus I/O and GPU idle times decrease.<br />
<br />
This has been implemented for both the mask-attack and both hybrid-attacks.<br />
<br />
It generally increases the performance by ~ <span style="text-decoration: underline;" class="mycode_u">+2% - but for all algorithm types!</span><br />
<br />
<hr class="mycode_hr" />
<br />
Another very intrusive change that took me several weeks was to back-porting of the <span style="font-weight: bold;" class="mycode_b">vector datatype on NVidia</span> from oclHashcat-lite v0.09.<br />
<br />
This <span style="text-decoration: underline;" class="mycode_u">drastically</span> improved the performance on the sm_21 based cards like the GTX460 or GTX560Ti.<br />
<br />
For example: The MD5 performance on my GTX560Ti increased from 893 Mhash/s to 1181 Mhash/s.<br />
<br />
<hr class="mycode_hr" />
<br />
I found motivation to backport the <span style="font-weight: bold;" class="mycode_b">long missed rule functions for GPU</span> from hashcat v0.38:<br />
<ul class="mycode_list"><li>RULE_OP_MANGLE_REPLACE_NP1<br />
</li>
<li>RULE_OP_MANGLE_REPLACE_NM1<br />
</li>
<li>RULE_OP_MANGLE_DUPEBLOCK_FIRST<br />
</li>
<li>RULE_OP_MANGLE_DUPEBLOCK_LAST<br />
</li>
</ul>
<br />
I also added the new RULE_OP_MANGLE_TITLE rule which was requested here: <a href="http://hashcat.net/forum/thread-499.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-499.html</a><br />
<br />
With both these changes the GPU rule engine is 100% compatible to the Hashcat rule engine.<br />
<br />
<hr class="mycode_hr" />
<br />
The <span style="font-weight: bold;" class="mycode_b">LM algorithm</span> was something I never wanted to add, but now its done.<br />
<br />
Check this thread and you know why I had to change my mind: <a href="http://hashcat.net/forum/thread-167.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-167.html</a><br />
<br />
One of the things that make me most proud is when oclHashcat-plus is used during a pentest. From what I have heard, pentesters usually have to check LM, NTLM, DES, Oracle, ... This LM kernel makes oclHashcat-plus much more feature-rich for the above task.<br />
<br />
This kernel is not the same one that I used when I wrote about the kernel on here: <a href="http://hashcat.net/forum/thread-846.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-846.html</a> <br />
<br />
I have optimized it a couple of times since then: The hd7970 now runs at <span style="text-decoration: underline;" class="mycode_u">1193 Mhash/s</span>, the gtx560Ti runs at <span style="text-decoration: underline;" class="mycode_u">448 Mhash/s</span>.<br />
<br />
<hr class="mycode_hr" />
<br />
While Oracle 11g already was supported with oclHashcat-plus v0.07, this version also brings <span style="font-weight: bold;" class="mycode_b">support for the old Oracle 7-10g versions</span>, too. <br />
<br />
Yes, the one that was based on DES-CBC.<br />
<br />
There was also a request here: <a href="http://hashcat.net/forum/thread-962.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-962.html</a><br />
<br />
But real reason was the same as for LM - I wanted to make oclHashcat-plus a more complete tool for pentesters.<br />
<br />
The hd7970 runs at <span style="text-decoration: underline;" class="mycode_u">429 Mhash/s</span>, the gtx570@1600 runs at <span style="text-decoration: underline;" class="mycode_u">164 Mhash/s</span>.<br />
<br />
<hr class="mycode_hr" />
<br />
When I've added WPA/WPA2 to oclHashcat-plus I was a bit lazy. Instead of implementing a <span style="font-weight: bold;" class="mycode_b">clean solution</span> to pass all the required data to crack WPA to the kernel I've just added this data to the salt struct. Compared to the salt size of other hash-types the ~400 byte for WPA is huge.<br />
<br />
That works fine but because of this all salted hash-types had to allocate and carry 400 additional bytes for nothing - for each salt. For example, if you crack an IPB2 hashlist which contains 1 million unique salts this took additional 400mb host AND GPU memory - for nothing.<br />
<br />
This has been fixed now.<br />
<br />
<hr class="mycode_hr" />
<br />
After Hashcat v0.39 and oclHashcat-lite v0.09 already got the update to the <span style="font-weight: bold;" class="mycode_b">new relaxed EULA</span>, oclHashcat-plus got it, too.<br />
<br />
This change for example, now allows companies to use all Hashcat derivates as long such use is inside a legal context. You can also distribute it within your linux distribution, package it or mirror it.<br />
<br />
I also removed the anti-leech protection for the files from the official download location and made them wget friendly.<br />
<br />
<hr class="mycode_hr" />
<br />
Although I am always very focused on increasing performance its not always possible. Each new driver, each new SDK always change the performance somehow for each kernel. It happens that code can become faster or slower without a single code change. So I can tell you, I made lots of performance increases code-wise, but due to some driver and SDK reasons some changes were sacrificed to compensate for their losses. <br />
<br />
But some improvements were so large that they still make a notable difference. For example I found a better way to deal with the salt on Joomla and MSSQL hashes and the slow hashes like phpass, and md5crypt or md5apr1 improved a lot due to other architecture changes in the host-code.<br />
<br />
To better keep track of the performance changes, you can take a look at arex's homepage. <br />
<br />
He put up a <span style="font-weight: bold;" class="mycode_b">benchmarking section</span>: <a href="http://thepasswordproject.com/oclhashcat_benchmarking" target="_blank" rel="noopener" class="mycode_url">http://thepasswordproject.com/oclhashcat_benchmarking</a><br />
<br />
Currently it lacks reports for NVidia, but the site also contains all the scripts I use for benchmarking.<br />
<br />
If you want to compare locally you can just download the scripts and run them to see how everything compares on your hardware.<br />
<br />
<hr class="mycode_hr" />
<br />
Thanks to superjames from Team Hashcat we had an awesome event which was based on Hashcat called "<span style="font-weight: bold;" class="mycode_b">The Best64 Challenge</span>".<br />
<br />
If you are interested in exactly what it was, visit the contest page here: <a href="http://beeeer.org/best64/" target="_blank" rel="noopener" class="mycode_url">http://beeeer.org/best64/</a><br />
<br />
The short story: Building on the results of this challenge, I create a new best64.rule and overwrite the old one.<br />
<br />
A write-up on how this was done can be found here: <a href="http://hashcat.net/forum/thread-1002-post-5284.html#pid5284" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1002-pos...ml#pid5284</a><br />
<br />
<hr class="mycode_hr" />
<br />
Did you ever try to crack hashes that include language specific or so called non-printable letters? Adding them to your charset on the command-line can be very tricky. There is a lot that can go wrong due to terminal emulation, encoding on the shell, fonts used, etc...<br />
<br />
So there was this request made for <span style="font-weight: bold;" class="mycode_b">File-based charsets</span>: <a href="http://hashcat.net/forum/thread-916.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-916.html</a><br />
<br />
Just add them to a file and this file will be parsed byte-wise.<br />
<br />
<hr class="mycode_hr" />
<br />
A change but something you will like is that I have added some <span style="font-weight: bold;" class="mycode_b">more information to the status display</span>.<br />
<br />
For example, if you crack WPA/WPA2, you can now see the ESSID, MAC Addresses etc.<br />
<br />
This goes back to this request: <a href="http://hashcat.net/forum/thread-752.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-752.html</a><br />
<br />
I also added things like hashfile and rulefile so you will be reminded of your attack (in case its has been running for some weeks).<br />
<br />
<hr class="mycode_hr" />
<br />
Last but not least, the <span style="font-weight: bold;" class="mycode_b">fixed bugs</span> list:<br />
<ul class="mycode_list"><li>Fixed bug leading to host program crash in NTLM and DCC brute-force AMD kernels<br />
</li>
<li>Fixed bug leading to host program crash in --show when having more than 100k entries in hashcat.pot<br />
</li>
<li>Fixed bug leading to host program crash in ETA display, if ETA calculated &gt; 60 years<br />
</li>
<li>Fixed bug leading to hash-not-found in Joomla if plaintext is of a length 4 or 8 and greater<br />
</li>
<li>Fixed bug leading to useless cracking in -a 6 mode in combination with WPA when the base plain is smaller than length 8<br />
</li>
<li>Fixed bug in UI: prompt was not shown after pause or resume session<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Some last words:<br />
<br />
If something does not work after upgrading -  Always remember to update to the latest driver before you post a thread on the Forum. Old drivers are the No. 1 problem of all reported problems on forum. There is a special page for drivers on the Wiki: <a href="http://hashcat.net/wiki/oclhashcat_catalyst_forceware" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/wiki/oclhashcat_catalyst_forceware</a><br />
<br />
For this release, you *must* update to Catalyst 12.4<br />
<br />
If you are on AMD, do *not* install the SDK unless you really know what you are doing. It contains an outdated library for OpenCL leading to slower and unstable kernels. Its confusing that AMD still ships them with the SDK.<br />
<br />
<hr class="mycode_hr" />
<br />
Here is the full changelog:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 1700 = SHA512<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1722 = OSX v10.7<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2600 = Double MD5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 3000 = LM<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 3100 = Oracle 7-10g<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVAPI R300<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 4.2<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia sm_30 gpu-architecture [ Kepler ]<br />
<br />
type: driver<br />
file: kernels<br />
desc: removed support for old AMD 4xxx GPU's (AMD removes support with Catalyst 12.7)<br />
<br />
type: driver<br />
file: host programs<br />
desc: workarounded a bug in CUDA cuMemAllocHost() to be able to support recent ForceWare<br />
cred: radix<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: backported GPU-based password candidate generator from oclHashcat-lite v0.09<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: backported vector datatype NVidia kernels from oclHashcat-lite v0.09<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --seperator-char feature from hashcat v0.38<br />
cred: Thorsheim<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for charset files and charset files<br />
cred: Thorsheim<br />
<br />
type: feature<br />
file: host programs<br />
desc: include line number in error message where applicable<br />
cred: arex1337<br />
<br />
type: feature<br />
file: host programs<br />
desc: added BSSID to status display<br />
cred: Hash-IT<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: Added new rule 'E', upper cases the first letter and every letter after a space<br />
cred: Hash-IT<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: Backported rule '.' and ',' from hashcat v0.38<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: Backported rule 'y' and 'Y' from hashcat v0.38<br />
<br />
type: feature<br />
file: host programs<br />
desc: added hashfile and rulefile to status display<br />
cred: chort, Thorsheim<br />
<br />
type: feature<br />
file: kernels<br />
desc: improved memory handling with salted hashes<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash MD5 if running in -a 3 mode and mask &lt; length 8<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NTLM and DCC brute-force AMD kernels<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in Joomla if pt is of length 4 or greater than 8 it was not getting cracked<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in Oracle 11g hash parsing function, salt length increased to 10 byte<br />
cred: flipit<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in --show when having more than 100k entries in hashcat.pot<br />
cred: Tixos<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in -a 6 mode in combination with WPA when base plain is &lt; length 8<br />
cred: logistix<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in UI: prompt was not shown after pause or resume session<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in ETA display if ETA calculated &gt; 60 years<br />
cred: arex<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a race condition in --remove leading to not removing cracked hashes from hashlist<br />
cred: forumhero<br />
<br />
type: bug<br />
file: host programs<br />
desc: check for integer overflow in keyspace of mask <br />
cred: LarryX<br />
<br />
type: change<br />
file: best64.rule<br />
desc: replaced content of best64.rule with the best rules from the best64.rule contest<br />
<br />
type: change<br />
file: host programs<br />
desc: EULA. Removed sections 2, 6, 8 and 9. Relaxed sections 3 and 7<br />
cred: hdmoore</code></div></div>]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Welcome to the latest version of the hashcat flagship: <span style="font-weight: bold;" class="mycode_b">oclHashcat-plus</span>.<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
I will go into detail about all the changes shortly, but first let me thank the beta testers and forum members. They do a really great job of sending me bug-reports, benchmarks, suggestions, keeping the wiki up to date, etc. You guys rock! Many thanks for your help!<br />
<br />
There are many new changes and its hard to pick which is the most important one. I will start in no particular order, but limit it to the most interesting changes. The full change-log can be found on the bottom.<br />
<br />
<hr class="mycode_hr" />
<br />
Added support for <span style="font-weight: bold;" class="mycode_b">Catalyst 12.4</span>.<br />
<br />
There is nothing much to say, but this enables the use of the following <span style="font-weight: bold;" class="mycode_b">hd7xxx</span> GPUS:<br />
<ul class="mycode_list"><li>Scrapper: 7350<br />
</li>
<li>Capeverde: 7570, 7670, 7770<br />
</li>
<li>Devastator: 7450, 7550<br />
</li>
<li>Pitcairn: 7850, 7870<br />
</li>
<li>Tahiti: 7950, 7970<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Added support for <span style="font-weight: bold;" class="mycode_b">CUDA 4.2</span>.<br />
<br />
This is interesting for two reasons:<br />
<ul class="mycode_list"><li>Adds support for the sm_30 gpu-architecture, aka Kepler, aka <span style="font-weight: bold;" class="mycode_b">gtx6xx</span><br />
</li>
<li>NVidia switched from GCC to LLVM for kernel compilations, that brings some good automated optimizations.<br />
</li>
</ul>
<br />
I hope there is something more inside sm_30 that I can use for optimization. <br />
<br />
To do this one requires the PTX documentation to be updated.<br />
<br />
<hr class="mycode_hr" />
<br />
I have backported the base <span style="font-weight: bold;" class="mycode_b">SHA-512</span> algorithm to oclHashcat-plus.<br />
<br />
As always, most of the code has been backported from oclHashcat-lite. My favorite way of developing is to: Start implementing on oclHashcat-lite, then collect some user experience and do some optimizations, then backport to oclHashcat-plus.<br />
<br />
It will run slower than you might expect it to (but not that slow). <br />
<br />
Still, it is pretty fast: The hd7970 runs at <span style="text-decoration: underline;" class="mycode_u">72582 khash/s</span>, the gtx570@1600 runs at <span style="text-decoration: underline;" class="mycode_u">71454 khash/s</span>.<br />
<br />
The original request post for the algorithm is here: <a href="http://hashcat.net/forum/thread-992.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-992.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
SHA-512 is also the base hash of the <span style="font-weight: bold;" class="mycode_b">Mac OSX v10.7 Lion</span> hashes.<br />
<br />
Its just salted with random 4 byte data. So I quickly decided to add it since there were several requests on IRC and via Email for it.<br />
<br />
The salt has an optimization impact on the NVidia kernel that actually makes it a bit faster than the raw SHA-512 hash. <br />
<br />
The hd7970 runs at <span style="text-decoration: underline;" class="mycode_u">69894 khash/s</span>, the gtx570@1600 runs at <span style="text-decoration: underline;" class="mycode_u">76266 khash/s</span>.<br />
<br />
But think before you start. These hashes are salted. That means you probably want to limit your attack to a single (but important) one.<br />
<br />
<hr class="mycode_hr" />
<br />
One of the most intrusive changes was the back-porting of the <span style="font-weight: bold;" class="mycode_b">GPU-based password candidate generator</span> from oclHashcat-lite v0.09.<br />
<br />
This greatly reduces the CPU load and the bus I/O and GPU idle times decrease.<br />
<br />
This has been implemented for both the mask-attack and both hybrid-attacks.<br />
<br />
It generally increases the performance by ~ <span style="text-decoration: underline;" class="mycode_u">+2% - but for all algorithm types!</span><br />
<br />
<hr class="mycode_hr" />
<br />
Another very intrusive change that took me several weeks was to back-porting of the <span style="font-weight: bold;" class="mycode_b">vector datatype on NVidia</span> from oclHashcat-lite v0.09.<br />
<br />
This <span style="text-decoration: underline;" class="mycode_u">drastically</span> improved the performance on the sm_21 based cards like the GTX460 or GTX560Ti.<br />
<br />
For example: The MD5 performance on my GTX560Ti increased from 893 Mhash/s to 1181 Mhash/s.<br />
<br />
<hr class="mycode_hr" />
<br />
I found motivation to backport the <span style="font-weight: bold;" class="mycode_b">long missed rule functions for GPU</span> from hashcat v0.38:<br />
<ul class="mycode_list"><li>RULE_OP_MANGLE_REPLACE_NP1<br />
</li>
<li>RULE_OP_MANGLE_REPLACE_NM1<br />
</li>
<li>RULE_OP_MANGLE_DUPEBLOCK_FIRST<br />
</li>
<li>RULE_OP_MANGLE_DUPEBLOCK_LAST<br />
</li>
</ul>
<br />
I also added the new RULE_OP_MANGLE_TITLE rule which was requested here: <a href="http://hashcat.net/forum/thread-499.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-499.html</a><br />
<br />
With both these changes the GPU rule engine is 100% compatible to the Hashcat rule engine.<br />
<br />
<hr class="mycode_hr" />
<br />
The <span style="font-weight: bold;" class="mycode_b">LM algorithm</span> was something I never wanted to add, but now its done.<br />
<br />
Check this thread and you know why I had to change my mind: <a href="http://hashcat.net/forum/thread-167.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-167.html</a><br />
<br />
One of the things that make me most proud is when oclHashcat-plus is used during a pentest. From what I have heard, pentesters usually have to check LM, NTLM, DES, Oracle, ... This LM kernel makes oclHashcat-plus much more feature-rich for the above task.<br />
<br />
This kernel is not the same one that I used when I wrote about the kernel on here: <a href="http://hashcat.net/forum/thread-846.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-846.html</a> <br />
<br />
I have optimized it a couple of times since then: The hd7970 now runs at <span style="text-decoration: underline;" class="mycode_u">1193 Mhash/s</span>, the gtx560Ti runs at <span style="text-decoration: underline;" class="mycode_u">448 Mhash/s</span>.<br />
<br />
<hr class="mycode_hr" />
<br />
While Oracle 11g already was supported with oclHashcat-plus v0.07, this version also brings <span style="font-weight: bold;" class="mycode_b">support for the old Oracle 7-10g versions</span>, too. <br />
<br />
Yes, the one that was based on DES-CBC.<br />
<br />
There was also a request here: <a href="http://hashcat.net/forum/thread-962.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-962.html</a><br />
<br />
But real reason was the same as for LM - I wanted to make oclHashcat-plus a more complete tool for pentesters.<br />
<br />
The hd7970 runs at <span style="text-decoration: underline;" class="mycode_u">429 Mhash/s</span>, the gtx570@1600 runs at <span style="text-decoration: underline;" class="mycode_u">164 Mhash/s</span>.<br />
<br />
<hr class="mycode_hr" />
<br />
When I've added WPA/WPA2 to oclHashcat-plus I was a bit lazy. Instead of implementing a <span style="font-weight: bold;" class="mycode_b">clean solution</span> to pass all the required data to crack WPA to the kernel I've just added this data to the salt struct. Compared to the salt size of other hash-types the ~400 byte for WPA is huge.<br />
<br />
That works fine but because of this all salted hash-types had to allocate and carry 400 additional bytes for nothing - for each salt. For example, if you crack an IPB2 hashlist which contains 1 million unique salts this took additional 400mb host AND GPU memory - for nothing.<br />
<br />
This has been fixed now.<br />
<br />
<hr class="mycode_hr" />
<br />
After Hashcat v0.39 and oclHashcat-lite v0.09 already got the update to the <span style="font-weight: bold;" class="mycode_b">new relaxed EULA</span>, oclHashcat-plus got it, too.<br />
<br />
This change for example, now allows companies to use all Hashcat derivates as long such use is inside a legal context. You can also distribute it within your linux distribution, package it or mirror it.<br />
<br />
I also removed the anti-leech protection for the files from the official download location and made them wget friendly.<br />
<br />
<hr class="mycode_hr" />
<br />
Although I am always very focused on increasing performance its not always possible. Each new driver, each new SDK always change the performance somehow for each kernel. It happens that code can become faster or slower without a single code change. So I can tell you, I made lots of performance increases code-wise, but due to some driver and SDK reasons some changes were sacrificed to compensate for their losses. <br />
<br />
But some improvements were so large that they still make a notable difference. For example I found a better way to deal with the salt on Joomla and MSSQL hashes and the slow hashes like phpass, and md5crypt or md5apr1 improved a lot due to other architecture changes in the host-code.<br />
<br />
To better keep track of the performance changes, you can take a look at arex's homepage. <br />
<br />
He put up a <span style="font-weight: bold;" class="mycode_b">benchmarking section</span>: <a href="http://thepasswordproject.com/oclhashcat_benchmarking" target="_blank" rel="noopener" class="mycode_url">http://thepasswordproject.com/oclhashcat_benchmarking</a><br />
<br />
Currently it lacks reports for NVidia, but the site also contains all the scripts I use for benchmarking.<br />
<br />
If you want to compare locally you can just download the scripts and run them to see how everything compares on your hardware.<br />
<br />
<hr class="mycode_hr" />
<br />
Thanks to superjames from Team Hashcat we had an awesome event which was based on Hashcat called "<span style="font-weight: bold;" class="mycode_b">The Best64 Challenge</span>".<br />
<br />
If you are interested in exactly what it was, visit the contest page here: <a href="http://beeeer.org/best64/" target="_blank" rel="noopener" class="mycode_url">http://beeeer.org/best64/</a><br />
<br />
The short story: Building on the results of this challenge, I create a new best64.rule and overwrite the old one.<br />
<br />
A write-up on how this was done can be found here: <a href="http://hashcat.net/forum/thread-1002-post-5284.html#pid5284" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-1002-pos...ml#pid5284</a><br />
<br />
<hr class="mycode_hr" />
<br />
Did you ever try to crack hashes that include language specific or so called non-printable letters? Adding them to your charset on the command-line can be very tricky. There is a lot that can go wrong due to terminal emulation, encoding on the shell, fonts used, etc...<br />
<br />
So there was this request made for <span style="font-weight: bold;" class="mycode_b">File-based charsets</span>: <a href="http://hashcat.net/forum/thread-916.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-916.html</a><br />
<br />
Just add them to a file and this file will be parsed byte-wise.<br />
<br />
<hr class="mycode_hr" />
<br />
A change but something you will like is that I have added some <span style="font-weight: bold;" class="mycode_b">more information to the status display</span>.<br />
<br />
For example, if you crack WPA/WPA2, you can now see the ESSID, MAC Addresses etc.<br />
<br />
This goes back to this request: <a href="http://hashcat.net/forum/thread-752.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-752.html</a><br />
<br />
I also added things like hashfile and rulefile so you will be reminded of your attack (in case its has been running for some weeks).<br />
<br />
<hr class="mycode_hr" />
<br />
Last but not least, the <span style="font-weight: bold;" class="mycode_b">fixed bugs</span> list:<br />
<ul class="mycode_list"><li>Fixed bug leading to host program crash in NTLM and DCC brute-force AMD kernels<br />
</li>
<li>Fixed bug leading to host program crash in --show when having more than 100k entries in hashcat.pot<br />
</li>
<li>Fixed bug leading to host program crash in ETA display, if ETA calculated &gt; 60 years<br />
</li>
<li>Fixed bug leading to hash-not-found in Joomla if plaintext is of a length 4 or 8 and greater<br />
</li>
<li>Fixed bug leading to useless cracking in -a 6 mode in combination with WPA when the base plain is smaller than length 8<br />
</li>
<li>Fixed bug in UI: prompt was not shown after pause or resume session<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
Some last words:<br />
<br />
If something does not work after upgrading -  Always remember to update to the latest driver before you post a thread on the Forum. Old drivers are the No. 1 problem of all reported problems on forum. There is a special page for drivers on the Wiki: <a href="http://hashcat.net/wiki/oclhashcat_catalyst_forceware" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/wiki/oclhashcat_catalyst_forceware</a><br />
<br />
For this release, you *must* update to Catalyst 12.4<br />
<br />
If you are on AMD, do *not* install the SDK unless you really know what you are doing. It contains an outdated library for OpenCL leading to slower and unstable kernels. Its confusing that AMD still ships them with the SDK.<br />
<br />
<hr class="mycode_hr" />
<br />
Here is the full changelog:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: feature<br />
file: kernels<br />
desc: added -m 1700 = SHA512<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1722 = OSX v10.7<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2600 = Double MD5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 3000 = LM<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 3100 = Oracle 7-10g<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVAPI R300<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia CUDA 4.2<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia sm_30 gpu-architecture [ Kepler ]<br />
<br />
type: driver<br />
file: kernels<br />
desc: removed support for old AMD 4xxx GPU's (AMD removes support with Catalyst 12.7)<br />
<br />
type: driver<br />
file: host programs<br />
desc: workarounded a bug in CUDA cuMemAllocHost() to be able to support recent ForceWare<br />
cred: radix<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: backported GPU-based password candidate generator from oclHashcat-lite v0.09<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: backported vector datatype NVidia kernels from oclHashcat-lite v0.09<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --seperator-char feature from hashcat v0.38<br />
cred: Thorsheim<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for charset files and charset files<br />
cred: Thorsheim<br />
<br />
type: feature<br />
file: host programs<br />
desc: include line number in error message where applicable<br />
cred: arex1337<br />
<br />
type: feature<br />
file: host programs<br />
desc: added BSSID to status display<br />
cred: Hash-IT<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: Added new rule 'E', upper cases the first letter and every letter after a space<br />
cred: Hash-IT<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: Backported rule '.' and ',' from hashcat v0.38<br />
<br />
type: feature<br />
file: kernels and host programs<br />
desc: Backported rule 'y' and 'Y' from hashcat v0.38<br />
<br />
type: feature<br />
file: host programs<br />
desc: added hashfile and rulefile to status display<br />
cred: chort, Thorsheim<br />
<br />
type: feature<br />
file: kernels<br />
desc: improved memory handling with salted hashes<br />
<br />
type: feature<br />
file: kernels<br />
desc: added reversing kernel for multihash MD5 if running in -a 3 mode and mask &lt; length 8<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in NTLM and DCC brute-force AMD kernels<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in Joomla if pt is of length 4 or greater than 8 it was not getting cracked<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in Oracle 11g hash parsing function, salt length increased to 10 byte<br />
cred: flipit<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in --show when having more than 100k entries in hashcat.pot<br />
cred: Tixos<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in -a 6 mode in combination with WPA when base plain is &lt; length 8<br />
cred: logistix<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in UI: prompt was not shown after pause or resume session<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in ETA display if ETA calculated &gt; 60 years<br />
cred: arex<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed a race condition in --remove leading to not removing cracked hashes from hashlist<br />
cred: forumhero<br />
<br />
type: bug<br />
file: host programs<br />
desc: check for integer overflow in keyspace of mask <br />
cred: LarryX<br />
<br />
type: change<br />
file: best64.rule<br />
desc: replaced content of best64.rule with the best rules from the best64.rule contest<br />
<br />
type: change<br />
file: host programs<br />
desc: EULA. Removed sections 2, 6, 8 and 9. Relaxed sections 3 and 7<br />
cred: hdmoore</code></div></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.071 *HOTFIX*]]></title>
			<link>https://hashcat.net/forum/thread-981.html</link>
			<pubDate>Mon, 12 Mar 2012 17:27:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-981.html</guid>
			<description><![CDATA[If you are using NVidia GPU and you are using ForceWare &gt; v275.33 you need this. Otherwise you dont need to upgrade.<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Installation steps: Just overwrite the binaries.<br />
<br />
This version workarounds the buggy cuMemAllocHost() function which leads to missing hashes. <br />
<br />
Original discussion is here: <a href="http://hashcat.net/forum/thread-954.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-954.html</a><br />
<br />
--<br />
atom<br />
]]></description>
			<content:encoded><![CDATA[If you are using NVidia GPU and you are using ForceWare &gt; v275.33 you need this. Otherwise you dont need to upgrade.<br />
<br />
Download here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Installation steps: Just overwrite the binaries.<br />
<br />
This version workarounds the buggy cuMemAllocHost() function which leads to missing hashes. <br />
<br />
Original discussion is here: <a href="http://hashcat.net/forum/thread-954.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-954.html</a><br />
<br />
--<br />
atom<br />
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.07]]></title>
			<link>https://hashcat.net/forum/thread-761.html</link>
			<pubDate>Sat, 31 Dec 2011 14:52:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-761.html</guid>
			<description><![CDATA[Hello Hashcat-Community,<br />
<br />
I am proud to present you the latest oclHashcat-plus v0.07 release.<br />
<br />
As you might already know, porting features from regular oclHashcat to oclHashcat-plus was my biggest goal for this release.<br />
<br />
But there are also:<br />
<ul class="mycode_list"><li>Performance improvements<br />
</li>
<li>Support for updated Drivers/SDKs<br />
</li>
<li>Implemented feature requests<br />
</li>
<li>Fixed bugs<br />
</li>
</ul>
<br />
This new oclHashcat-plus v0.07 is the result of all these changes.<br />
<br />
<hr class="mycode_hr" />
<br />
The following features that have been ported from regular oclHashcat v0.26 to oclHashcat-plus v0.07:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/wiki/combinator_attack" target="_blank" rel="noopener" class="mycode_url">Combinator Attack</a><br />
</li>
<li><a href="http://hashcat.net/wiki/hybrid_attack" target="_blank" rel="noopener" class="mycode_url">Hybrid Attack</a><br />
</li>
<li><a href="http://hashcat.net/wiki/brute_force_attack" target="_blank" rel="noopener" class="mycode_url">Brute-Force Attack</a><br />
</li>
<li><a href="http://hashcat.net/wiki/mask_attack" target="_blank" rel="noopener" class="mycode_url">Mask Attack</a><br />
</li>
</ul>
<br />
These Attack-modes made regular oclHashcat unique. <br />
<br />
Since they have been ported to oclHashcat-plus I can finally <span style="text-decoration: underline;" class="mycode_u">officially deprecate regular oclHashcat</span>.<br />
<br />
Running an Brute-Force attack and Mask attack was already possible with oclHashcat-plus v0.06 but you had to pipe the data from maskprocessor into oclHashcat-plus. It was getting more complicated If you wanted to attack so called "fast algorithms" like MD5. you had to split and generate rules to run them efficient.<br />
<br />
To be exact, the Brute-Force attack and Mask attack kernels are not-reversed versions from oclHashcat-lite v0.08. This version is specialized on doing Brute-Force and Mask attacks. For those using regular oclHashcat for Brute-Force and do not know the difference to oclHashcat-lite: There is no more thing called right- and left-side of the mask. The new oclHashcat-plus automatically calculates the most efficient split. This will hopefully make it easier especially for the new users.<br />
<br />
<hr class="mycode_hr" />
<br />
The next feature, or let me say killer feature, is what I call "multirules". <br />
<br />
To explain it I made a special forum post with some examples and details here: <a href="http://hashcat.net/forum/thread-703.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-703.html</a><br />
<br />
Especially when you think of creating own rules this will totally boost your creativity. <br />
<br />
To get started I also added some example rules which i called hybrid rules. They can be found in rules/hybrid/. When you start playing with multirules you will shortly notice how to use the hybrid rules and why they have been added.<br />
<br />
<hr class="mycode_hr" />
<br />
Then there was this nice request: <a href="http://hashcat.net/forum/thread-437.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-437.html</a> <br />
<br />
Basically it says: If you are a pentester and you use oclHashcat-plus on the hashes of your customer you might have some restrictive policies on how to handle the cracked hashes. <br />
<br />
This new requested feature tells oclHashcat-plus to NOT show the cracked plaintext. It will show only the cracked hash. That might be enough for you to build statistics or to inform users to change their passwords. <br />
<br />
So, if you are interessted in this, check the new --outfile-format parameters.<br />
<br />
<hr class="mycode_hr" />
<br />
Then there are new Kernels. Some of them have been heavily requested.<br />
<ul class="mycode_list"><li>Joomla<br />
</li>
<li>osCommerce, xt:Commerce<br />
</li>
<li>SMF<br />
</li>
<li>OSX v10.4, v10.5, v10.6<br />
</li>
</ul>
<br />
You know, oclHashcat-plus does not have generic Kernels like md5(&#36;salt.&#36;pass) or md5(&#36;pass.&#36;salt). But if you take a close look at what is behind the new kernels and with a bit of knowledge in hashcracking you might be able to exploit these kernels <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Another important thing to notice is that i have renamed some of the hash-types. For example, Vbull which was -m 5 is now -m 2611. There is a full list of the renamed kernels in the Changelog below. The reason for this that i put in some system into the numbers.<br />
<br />
<hr class="mycode_hr" />
<br />
A nice bugfix to mention is that you can now use commandline file-globbing on windows again. For example, you can now use *.dict to tell oclHashcat-plus that it should use all files matching *.dict as your wordlists in a sequence. This was changed somehow in a previous mingw release and i did not notice this change so it was not useable even it was already supported.<br />
<br />
<hr class="mycode_hr" />
<br />
CUDA 4.1 dropped in unexpected. OK, its still just an RC but I really have to say: WOW! They claim a speed increase of 10% on their presentation. And its true, the llvm compiler (which was added) create some neat optimizations in the kernels. But to make use of them, I have to change all the datatypes used in the kernels to vector datatypes. Otherwise they produce slower code than CUDA 4.0. So thats why I stick to CUDA 4.0 for this release. In a later release I will switch to vector datatypes and then to CUDA 4.1.<br />
<br />
AMD was not lazy, too. The new AMD APP SDK v2.6 include support for the upcomming hd7xxx series. So what I did is that i blindly generated the Kernels for all hd7xxx and added them to this release. Well this is only theory. We will see how it works out. These new kernels are called "Capeverde", "Pitcairn" and "Tahiti". <br />
<br />
<hr class="mycode_hr" />
<br />
Last but not least here is the Full changelog v0.06 -&gt; v0.07:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: speedups<br />
file: kernels and host programs<br />
desc: vBulletin &lt; v3.8.5:&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+5.20%, NV GTX580&nbsp;&nbsp;+7.86%<br />
desc: vBulletin &gt; v3.8.5:&nbsp;&nbsp;AMD hd5970 +16.19%, NV GTX580&nbsp;&nbsp;+5.93%<br />
desc: IPB2, MyBB1.2:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AMD hd5970 +14.83%, NV GTX580&nbsp;&nbsp;+5.78%<br />
desc: SHA1:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+9.01%, NV GTX580&nbsp;&nbsp; 0.00%<br />
desc: SHA256:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+1.55%, NV GTX580&nbsp;&nbsp;+4.21%<br />
desc: md5crypt:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970 +11.19%, NV GTX580&nbsp;&nbsp;+2.83%<br />
desc: md5apr1:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AMD hd5970 +10.17%, NV GTX580&nbsp;&nbsp;+1.73%<br />
desc: NTLM:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+3.43%, NV GTX580&nbsp;&nbsp; 0.00%<br />
desc: DCC:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AMD hd5970&nbsp;&nbsp;+2.46%, NV GTX580&nbsp;&nbsp;+0.33%<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 11 = Joomla<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 21 = osCommerce, xt:Commerce<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 121 = SMF &gt; v1.1<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 122 = OSX v10.4, v10.5, v10.6<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst 11.12 and AMD APP SDK 2.6<br />
<br />
type: feature<br />
file: kernels<br />
desc: added support for AMD GPU's "Devastator" and "Scrapper"<br />
<br />
type: feature<br />
file: kernels<br />
desc: added support for AMD GPU's "Capeverde", "Pitcairn" and "Tahiti"<br />
<br />
type: feature<br />
file: host programs and kernel<br />
desc: backported combinator attack from oclHashcat v0.26<br />
<br />
type: feature<br />
file: host programs and kernel<br />
desc: backported hybrid attack from oclHashcat v0.26<br />
<br />
type: feature<br />
file: host programs and kernel<br />
desc: backported brute-force attack from oclHashcat-lite v0.08<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --cpu-affinity from oclHashcat-lite v0.08<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --outfile-format from oclHashcat-lite v0.08<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for multirules (multiple -r parameters allowed)<br />
cred: http://hashcat.net/forum/thread-703.html<br />
<br />
type: improvement<br />
file: rules<br />
desc: added lots of minirules for multirule engine to rules/hybrid/<br />
<br />
type: change<br />
file: kernels<br />
desc: renamed -m 5&nbsp;&nbsp;&nbsp;&nbsp;to -m 2611<br />
desc: renamed -m 9&nbsp;&nbsp;&nbsp;&nbsp;to -m 2811<br />
desc: renamed -m 15&nbsp;&nbsp; to -m 2711<br />
desc: renamed -m 600&nbsp;&nbsp;to -m 101<br />
desc: renamed -m 700&nbsp;&nbsp;to -m 111<br />
desc: renamed -m 1300 to -m 131<br />
desc: renamed -m 2000 to -m 112<br />
desc: renamed -m 2300 to -m 132<br />
<br />
type: change<br />
file: rules<br />
desc: redesigned usage screen<br />
cred: http://hashcat.net/forum/thread-716.html<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in WPA/WPA2 kernel if essid length &gt;= 28<br />
cred: http://hashcat.net/forum/showthread.php?tid=494<br />
<br />
type: bug<br />
file: host programs<br />
desc: reenabled file-globbing on cmdline for windows<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in length check of hash parser if user specified --hex-salt<br />
<br />
type: docs<br />
file: todo.txt<br />
desc: added todo file<br />
[/code</code></div></div>]<br />
]]></description>
			<content:encoded><![CDATA[Hello Hashcat-Community,<br />
<br />
I am proud to present you the latest oclHashcat-plus v0.07 release.<br />
<br />
As you might already know, porting features from regular oclHashcat to oclHashcat-plus was my biggest goal for this release.<br />
<br />
But there are also:<br />
<ul class="mycode_list"><li>Performance improvements<br />
</li>
<li>Support for updated Drivers/SDKs<br />
</li>
<li>Implemented feature requests<br />
</li>
<li>Fixed bugs<br />
</li>
</ul>
<br />
This new oclHashcat-plus v0.07 is the result of all these changes.<br />
<br />
<hr class="mycode_hr" />
<br />
The following features that have been ported from regular oclHashcat v0.26 to oclHashcat-plus v0.07:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/wiki/combinator_attack" target="_blank" rel="noopener" class="mycode_url">Combinator Attack</a><br />
</li>
<li><a href="http://hashcat.net/wiki/hybrid_attack" target="_blank" rel="noopener" class="mycode_url">Hybrid Attack</a><br />
</li>
<li><a href="http://hashcat.net/wiki/brute_force_attack" target="_blank" rel="noopener" class="mycode_url">Brute-Force Attack</a><br />
</li>
<li><a href="http://hashcat.net/wiki/mask_attack" target="_blank" rel="noopener" class="mycode_url">Mask Attack</a><br />
</li>
</ul>
<br />
These Attack-modes made regular oclHashcat unique. <br />
<br />
Since they have been ported to oclHashcat-plus I can finally <span style="text-decoration: underline;" class="mycode_u">officially deprecate regular oclHashcat</span>.<br />
<br />
Running an Brute-Force attack and Mask attack was already possible with oclHashcat-plus v0.06 but you had to pipe the data from maskprocessor into oclHashcat-plus. It was getting more complicated If you wanted to attack so called "fast algorithms" like MD5. you had to split and generate rules to run them efficient.<br />
<br />
To be exact, the Brute-Force attack and Mask attack kernels are not-reversed versions from oclHashcat-lite v0.08. This version is specialized on doing Brute-Force and Mask attacks. For those using regular oclHashcat for Brute-Force and do not know the difference to oclHashcat-lite: There is no more thing called right- and left-side of the mask. The new oclHashcat-plus automatically calculates the most efficient split. This will hopefully make it easier especially for the new users.<br />
<br />
<hr class="mycode_hr" />
<br />
The next feature, or let me say killer feature, is what I call "multirules". <br />
<br />
To explain it I made a special forum post with some examples and details here: <a href="http://hashcat.net/forum/thread-703.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-703.html</a><br />
<br />
Especially when you think of creating own rules this will totally boost your creativity. <br />
<br />
To get started I also added some example rules which i called hybrid rules. They can be found in rules/hybrid/. When you start playing with multirules you will shortly notice how to use the hybrid rules and why they have been added.<br />
<br />
<hr class="mycode_hr" />
<br />
Then there was this nice request: <a href="http://hashcat.net/forum/thread-437.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-437.html</a> <br />
<br />
Basically it says: If you are a pentester and you use oclHashcat-plus on the hashes of your customer you might have some restrictive policies on how to handle the cracked hashes. <br />
<br />
This new requested feature tells oclHashcat-plus to NOT show the cracked plaintext. It will show only the cracked hash. That might be enough for you to build statistics or to inform users to change their passwords. <br />
<br />
So, if you are interessted in this, check the new --outfile-format parameters.<br />
<br />
<hr class="mycode_hr" />
<br />
Then there are new Kernels. Some of them have been heavily requested.<br />
<ul class="mycode_list"><li>Joomla<br />
</li>
<li>osCommerce, xt:Commerce<br />
</li>
<li>SMF<br />
</li>
<li>OSX v10.4, v10.5, v10.6<br />
</li>
</ul>
<br />
You know, oclHashcat-plus does not have generic Kernels like md5(&#36;salt.&#36;pass) or md5(&#36;pass.&#36;salt). But if you take a close look at what is behind the new kernels and with a bit of knowledge in hashcracking you might be able to exploit these kernels <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Another important thing to notice is that i have renamed some of the hash-types. For example, Vbull which was -m 5 is now -m 2611. There is a full list of the renamed kernels in the Changelog below. The reason for this that i put in some system into the numbers.<br />
<br />
<hr class="mycode_hr" />
<br />
A nice bugfix to mention is that you can now use commandline file-globbing on windows again. For example, you can now use *.dict to tell oclHashcat-plus that it should use all files matching *.dict as your wordlists in a sequence. This was changed somehow in a previous mingw release and i did not notice this change so it was not useable even it was already supported.<br />
<br />
<hr class="mycode_hr" />
<br />
CUDA 4.1 dropped in unexpected. OK, its still just an RC but I really have to say: WOW! They claim a speed increase of 10% on their presentation. And its true, the llvm compiler (which was added) create some neat optimizations in the kernels. But to make use of them, I have to change all the datatypes used in the kernels to vector datatypes. Otherwise they produce slower code than CUDA 4.0. So thats why I stick to CUDA 4.0 for this release. In a later release I will switch to vector datatypes and then to CUDA 4.1.<br />
<br />
AMD was not lazy, too. The new AMD APP SDK v2.6 include support for the upcomming hd7xxx series. So what I did is that i blindly generated the Kernels for all hd7xxx and added them to this release. Well this is only theory. We will see how it works out. These new kernels are called "Capeverde", "Pitcairn" and "Tahiti". <br />
<br />
<hr class="mycode_hr" />
<br />
Last but not least here is the Full changelog v0.06 -&gt; v0.07:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: speedups<br />
file: kernels and host programs<br />
desc: vBulletin &lt; v3.8.5:&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+5.20%, NV GTX580&nbsp;&nbsp;+7.86%<br />
desc: vBulletin &gt; v3.8.5:&nbsp;&nbsp;AMD hd5970 +16.19%, NV GTX580&nbsp;&nbsp;+5.93%<br />
desc: IPB2, MyBB1.2:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AMD hd5970 +14.83%, NV GTX580&nbsp;&nbsp;+5.78%<br />
desc: SHA1:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+9.01%, NV GTX580&nbsp;&nbsp; 0.00%<br />
desc: SHA256:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+1.55%, NV GTX580&nbsp;&nbsp;+4.21%<br />
desc: md5crypt:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970 +11.19%, NV GTX580&nbsp;&nbsp;+2.83%<br />
desc: md5apr1:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AMD hd5970 +10.17%, NV GTX580&nbsp;&nbsp;+1.73%<br />
desc: NTLM:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd5970&nbsp;&nbsp;+3.43%, NV GTX580&nbsp;&nbsp; 0.00%<br />
desc: DCC:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AMD hd5970&nbsp;&nbsp;+2.46%, NV GTX580&nbsp;&nbsp;+0.33%<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 11 = Joomla<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 21 = osCommerce, xt:Commerce<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 121 = SMF &gt; v1.1<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 122 = OSX v10.4, v10.5, v10.6<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst 11.12 and AMD APP SDK 2.6<br />
<br />
type: feature<br />
file: kernels<br />
desc: added support for AMD GPU's "Devastator" and "Scrapper"<br />
<br />
type: feature<br />
file: kernels<br />
desc: added support for AMD GPU's "Capeverde", "Pitcairn" and "Tahiti"<br />
<br />
type: feature<br />
file: host programs and kernel<br />
desc: backported combinator attack from oclHashcat v0.26<br />
<br />
type: feature<br />
file: host programs and kernel<br />
desc: backported hybrid attack from oclHashcat v0.26<br />
<br />
type: feature<br />
file: host programs and kernel<br />
desc: backported brute-force attack from oclHashcat-lite v0.08<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --cpu-affinity from oclHashcat-lite v0.08<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --outfile-format from oclHashcat-lite v0.08<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for multirules (multiple -r parameters allowed)<br />
cred: http://hashcat.net/forum/thread-703.html<br />
<br />
type: improvement<br />
file: rules<br />
desc: added lots of minirules for multirule engine to rules/hybrid/<br />
<br />
type: change<br />
file: kernels<br />
desc: renamed -m 5&nbsp;&nbsp;&nbsp;&nbsp;to -m 2611<br />
desc: renamed -m 9&nbsp;&nbsp;&nbsp;&nbsp;to -m 2811<br />
desc: renamed -m 15&nbsp;&nbsp; to -m 2711<br />
desc: renamed -m 600&nbsp;&nbsp;to -m 101<br />
desc: renamed -m 700&nbsp;&nbsp;to -m 111<br />
desc: renamed -m 1300 to -m 131<br />
desc: renamed -m 2000 to -m 112<br />
desc: renamed -m 2300 to -m 132<br />
<br />
type: change<br />
file: rules<br />
desc: redesigned usage screen<br />
cred: http://hashcat.net/forum/thread-716.html<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed bug in WPA/WPA2 kernel if essid length &gt;= 28<br />
cred: http://hashcat.net/forum/showthread.php?tid=494<br />
<br />
type: bug<br />
file: host programs<br />
desc: reenabled file-globbing on cmdline for windows<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in length check of hash parser if user specified --hex-salt<br />
<br />
type: docs<br />
file: todo.txt<br />
desc: added todo file<br />
[/code</code></div></div>]<br />
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.06]]></title>
			<link>https://hashcat.net/forum/thread-487.html</link>
			<pubDate>Fri, 16 Sep 2011 12:11:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-487.html</guid>
			<description><![CDATA[Hello Hashcat users,<br />
<br />
I am really proud to release this new version 0.06 of oclHashcat-plus to public. It contains a lot of new features, improvements, changes and bugfixes.<br />
<br />
As you may already know, the highlight is the new WPA/WPA2 kernel.<br />
This new oclHashcat-plus was faster than every other WPA cracker in every configuration i had tested.<br />
Especially owners of AMD cards and owners of multi-gpu systems will see a neat improvement. But dont expect too much.<br />
The rumours saying its 3 or 4 times faster than other WPA crackers are true, but only because of a very special case (Big number of GPUs).<br />
What makes the oclHashcat-plus WPA/WPA2 kernel really unique is that it calculates the <span style="text-decoration: underline;" class="mycode_u">full WPA handshake on GPU</span>.<br />
It calculates the PMK, the PTK and the final EAPOL HMAC, everything on GPU. So its not just the PMK.<br />
Doing everything in GPU results in 0% CPU usage and therefore saves a lot of energy and gives a lag-free desktop.<br />
<br />
But WPA isnt everything. There is also many other new algorithms added.<br />
For example mscash2 (DCC2), vBulletin (both salt versions), Cisco PIX, SHA256 etc.., see changelog for full list.<br />
I also improved the performance of the already supported algorithms by optimizing them for the current state of the art GPUs. <br />
For example; NTLM and DEScrypt on the 4xx and 5xx NVidias is <span style="font-weight: bold;" class="mycode_b">+27.15%</span> and <span style="font-weight: bold;" class="mycode_b">+28.91%</span>. <br />
On AMD I focused on hd69xx tuning and achieved <span style="font-weight: bold;" class="mycode_b">+16.07%</span> again on DEScrypt.<br />
<br />
Some new features many of you will like:<br />
<ul class="mycode_list"><li>The support for a potfile and therefore the parameter using it: --show, --left and --usernames (finally usernames). <br />
This is useful in hashlist management.<br />
</li>
<li>The first "real" ported alternative attack vector from hashcat CPU: the Permutation-attack. <br />
Hint: For best performance, use the prepare utility from hashcat-utils with your dictionaries. It reorders their content so that you can unique the resulting dictionary afterwards.<br />
</li>
<li>Fine-tuned and re-calibrated default workload settings depending on the combination of GPU-type and algorithm. <br />
This greatly reduces desktop lags.<br />
</li>
<li>The status screen got a complete facelift (additional informations like GPU-Idle, reject counter etc.)<br />
</li>
</ul>
<br />
Due to the massive changes of core code, all the new kernels and the new features, it may occour you face some bugs.<br />
Beta testers did a really great job finding them and all the reported bugs have been fixed.<br />
If you find bugs or any other irregularities do not hesitate to report them on Hashcat Forum or on #hashcat IRC channel on rizon.<br />
<br />
Enough said. HF Guys!!!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Full changelog v0.05 -&gt; v0.06:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: speedups<br />
desc: MD5:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd6990&nbsp;&nbsp;+7.78%, NV gtx580&nbsp;&nbsp;+1.84%<br />
desc: phpass:&nbsp;&nbsp; AMD hd6990&nbsp;&nbsp;+1.01%, NV gtx580&nbsp;&nbsp; 0.00%<br />
desc: md5crypt: AMD hd6990 +10.13%, NV gtx580&nbsp;&nbsp;+7.08%<br />
desc: MD4:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd6990 +15.34%, NV gtx580 +15.71%<br />
desc: NTLM:&nbsp;&nbsp;&nbsp;&nbsp; AMD hd6990&nbsp;&nbsp;+9.06%, NV gtx580 +27.15%<br />
desc: DCC:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd6990&nbsp;&nbsp;+7.06%, NV gtx580&nbsp;&nbsp;+6.71%<br />
desc: descrypt: AMD hd6990 +16.07%, NV gtx580 +28.91%<br />
desc: md5apr1:&nbsp;&nbsp;AMD hd6990&nbsp;&nbsp;+9.62%, NV gtx580&nbsp;&nbsp;+7.85%<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5 = vBulletin &lt; v3.8.5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 9 = IPB2, MyBB1.2<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 15 = vBulletin &gt; v3.8.5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 100 = SHA1<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 300 = MySQL &gt; v4.1<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 500 = Cisco-IOS MD5 (additional)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 600 = nsldap, SHA-1(Base64), Netscape LDAP SHA<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 700 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1300 = MSSQL(2000)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1400 = SHA256<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2000 = Oracle 11g<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2100 = Domain Cached Credentials2, mscash2<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2300 = MSSQL(2005)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2400 = Cisco-PIX MD5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2500 = WPA/WPA2<br />
<br />
type: feature<br />
file: host programs, kernels<br />
desc: added -a 4 = permutation attack<br />
<br />
type: feature<br />
file: host programs, kernels<br />
desc: moved rule engine for slow algorithms from gpu to cpu based calculation<br />
<br />
type: feature<br />
file: host programs<br />
desc: added potfile support<br />
<br />
type: feature<br />
file: host programs<br />
desc: added parameter --show to show all cracked hashes using the potfile<br />
<br />
type: feature<br />
file: host programs<br />
desc: added parameter --left to show all uncracked hashes using the potfile<br />
<br />
type: feature<br />
file: host programs<br />
desc: added parameter --username to enable ignore usernames in hashfile<br />
<br />
type: feature<br />
file: host programs<br />
desc: added seperate timers for real speed (GPU+CPU) and cracking speed (GPU)<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --hex-salt from oclHashcat-lite v0.06<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported status codes on exit from oclHashcat-lite v0.06<br />
<br />
type: improvement<br />
file: kernels<br />
desc: increased maximum functions per rule from 8 to 16<br />
<br />
type: improvement<br />
file: kernels<br />
desc: increased maximum --gpu-loops from 512 to 1024<br />
<br />
type: improvement<br />
file: kernels<br />
desc: increased maximum username length in DCC kernels from 7 to 15<br />
<br />
type: improvement<br />
file: host programs<br />
desc: added display progress of dictionary scanning phase, keep user updated<br />
<br />
type: feature<br />
file: host programs<br />
desc: added display of the hash itself in single hash cracking<br />
<br />
type: improvement<br />
file: host programs<br />
desc: redesigned digest-to-salt handling to remove irregular hash handling<br />
<br />
type: improvement<br />
file: rules<br />
desc: updated d3adone.rule (to 35406 unique rules)<br />
<br />
type: improvement<br />
file: rules<br />
desc: added rules/T0XlC.rule<br />
<br />
type: improvement<br />
file: rules<br />
desc: added rules/toggles[12345].rule<br />
<br />
type: contrib<br />
file: external<br />
desc: added patch for aircrack-ng to enable aircrack-ng dumping .hccap file<br />
<br />
type: contrib<br />
file: external<br />
desc: added alternative solution for converting: http://hashcat.net/cap2hccap<br />
<br />
type: contrib<br />
file: external<br />
desc: added configureable leetspeek.rule permutation generator script<br />
cred: lanjelot<br />
<br />
type: change<br />
file: host programs<br />
desc: recalibrated defaults so that kernels run fast but not to aggressive<br />
<br />
type: change<br />
file: host programs<br />
desc: changed speed display compressing threshold from 10000 to 100000<br />
<br />
type: change<br />
file: host programs<br />
desc: changed exit behaviour in case of invalid hash from exit to skip-only<br />
<br />
type: bug<br />
file: kernels (nvidia only)<br />
desc: fixed single-hash issue in MD4, NTLM and DCC kernels<br />
cred: http://hashcat.net/forum/thread-822.html<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed multi-hash issue in phpass kernel<br />
cred: http://hashcat.net/forum/thread-768.html<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed issue in multi-hash in DCC kernel<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed issue in gpu rule-engine in function "s"<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed issue when enabling pause mode in salted multihash cracking<br />
cred: San<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed calculating wrong progress issue in status display<br />
cred: http://hashcat.net/forum/thread-721.html<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in --gpu-async which was not enabled even if specified<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed version string on startup<br />
cred: http://hashcat.net/forum/showthread.php?tid=470<br />
<br />
type: bug<br />
file: host programs<br />
desc: workarounded AMD issue ../../src/xcb_io.c:140: dequeue_pending_request<br />
cred: http://hashcat.net/forum/showthread.php?tid=462</code></div></div><br />
--<br />
atom<br />
<br />
]]></description>
			<content:encoded><![CDATA[Hello Hashcat users,<br />
<br />
I am really proud to release this new version 0.06 of oclHashcat-plus to public. It contains a lot of new features, improvements, changes and bugfixes.<br />
<br />
As you may already know, the highlight is the new WPA/WPA2 kernel.<br />
This new oclHashcat-plus was faster than every other WPA cracker in every configuration i had tested.<br />
Especially owners of AMD cards and owners of multi-gpu systems will see a neat improvement. But dont expect too much.<br />
The rumours saying its 3 or 4 times faster than other WPA crackers are true, but only because of a very special case (Big number of GPUs).<br />
What makes the oclHashcat-plus WPA/WPA2 kernel really unique is that it calculates the <span style="text-decoration: underline;" class="mycode_u">full WPA handshake on GPU</span>.<br />
It calculates the PMK, the PTK and the final EAPOL HMAC, everything on GPU. So its not just the PMK.<br />
Doing everything in GPU results in 0% CPU usage and therefore saves a lot of energy and gives a lag-free desktop.<br />
<br />
But WPA isnt everything. There is also many other new algorithms added.<br />
For example mscash2 (DCC2), vBulletin (both salt versions), Cisco PIX, SHA256 etc.., see changelog for full list.<br />
I also improved the performance of the already supported algorithms by optimizing them for the current state of the art GPUs. <br />
For example; NTLM and DEScrypt on the 4xx and 5xx NVidias is <span style="font-weight: bold;" class="mycode_b">+27.15%</span> and <span style="font-weight: bold;" class="mycode_b">+28.91%</span>. <br />
On AMD I focused on hd69xx tuning and achieved <span style="font-weight: bold;" class="mycode_b">+16.07%</span> again on DEScrypt.<br />
<br />
Some new features many of you will like:<br />
<ul class="mycode_list"><li>The support for a potfile and therefore the parameter using it: --show, --left and --usernames (finally usernames). <br />
This is useful in hashlist management.<br />
</li>
<li>The first "real" ported alternative attack vector from hashcat CPU: the Permutation-attack. <br />
Hint: For best performance, use the prepare utility from hashcat-utils with your dictionaries. It reorders their content so that you can unique the resulting dictionary afterwards.<br />
</li>
<li>Fine-tuned and re-calibrated default workload settings depending on the combination of GPU-type and algorithm. <br />
This greatly reduces desktop lags.<br />
</li>
<li>The status screen got a complete facelift (additional informations like GPU-Idle, reject counter etc.)<br />
</li>
</ul>
<br />
Due to the massive changes of core code, all the new kernels and the new features, it may occour you face some bugs.<br />
Beta testers did a really great job finding them and all the reported bugs have been fixed.<br />
If you find bugs or any other irregularities do not hesitate to report them on Hashcat Forum or on #hashcat IRC channel on rizon.<br />
<br />
Enough said. HF Guys!!!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
Full changelog v0.05 -&gt; v0.06:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: speedups<br />
desc: MD5:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd6990&nbsp;&nbsp;+7.78%, NV gtx580&nbsp;&nbsp;+1.84%<br />
desc: phpass:&nbsp;&nbsp; AMD hd6990&nbsp;&nbsp;+1.01%, NV gtx580&nbsp;&nbsp; 0.00%<br />
desc: md5crypt: AMD hd6990 +10.13%, NV gtx580&nbsp;&nbsp;+7.08%<br />
desc: MD4:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd6990 +15.34%, NV gtx580 +15.71%<br />
desc: NTLM:&nbsp;&nbsp;&nbsp;&nbsp; AMD hd6990&nbsp;&nbsp;+9.06%, NV gtx580 +27.15%<br />
desc: DCC:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AMD hd6990&nbsp;&nbsp;+7.06%, NV gtx580&nbsp;&nbsp;+6.71%<br />
desc: descrypt: AMD hd6990 +16.07%, NV gtx580 +28.91%<br />
desc: md5apr1:&nbsp;&nbsp;AMD hd6990&nbsp;&nbsp;+9.62%, NV gtx580&nbsp;&nbsp;+7.85%<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 5 = vBulletin &lt; v3.8.5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 9 = IPB2, MyBB1.2<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 15 = vBulletin &gt; v3.8.5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 100 = SHA1<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 300 = MySQL &gt; v4.1<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 500 = Cisco-IOS MD5 (additional)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 600 = nsldap, SHA-1(Base64), Netscape LDAP SHA<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 700 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1300 = MSSQL(2000)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1400 = SHA256<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2000 = Oracle 11g<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2100 = Domain Cached Credentials2, mscash2<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2300 = MSSQL(2005)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2400 = Cisco-PIX MD5<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 2500 = WPA/WPA2<br />
<br />
type: feature<br />
file: host programs, kernels<br />
desc: added -a 4 = permutation attack<br />
<br />
type: feature<br />
file: host programs, kernels<br />
desc: moved rule engine for slow algorithms from gpu to cpu based calculation<br />
<br />
type: feature<br />
file: host programs<br />
desc: added potfile support<br />
<br />
type: feature<br />
file: host programs<br />
desc: added parameter --show to show all cracked hashes using the potfile<br />
<br />
type: feature<br />
file: host programs<br />
desc: added parameter --left to show all uncracked hashes using the potfile<br />
<br />
type: feature<br />
file: host programs<br />
desc: added parameter --username to enable ignore usernames in hashfile<br />
<br />
type: feature<br />
file: host programs<br />
desc: added seperate timers for real speed (GPU+CPU) and cracking speed (GPU)<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported --hex-salt from oclHashcat-lite v0.06<br />
<br />
type: feature<br />
file: host programs<br />
desc: backported status codes on exit from oclHashcat-lite v0.06<br />
<br />
type: improvement<br />
file: kernels<br />
desc: increased maximum functions per rule from 8 to 16<br />
<br />
type: improvement<br />
file: kernels<br />
desc: increased maximum --gpu-loops from 512 to 1024<br />
<br />
type: improvement<br />
file: kernels<br />
desc: increased maximum username length in DCC kernels from 7 to 15<br />
<br />
type: improvement<br />
file: host programs<br />
desc: added display progress of dictionary scanning phase, keep user updated<br />
<br />
type: feature<br />
file: host programs<br />
desc: added display of the hash itself in single hash cracking<br />
<br />
type: improvement<br />
file: host programs<br />
desc: redesigned digest-to-salt handling to remove irregular hash handling<br />
<br />
type: improvement<br />
file: rules<br />
desc: updated d3adone.rule (to 35406 unique rules)<br />
<br />
type: improvement<br />
file: rules<br />
desc: added rules/T0XlC.rule<br />
<br />
type: improvement<br />
file: rules<br />
desc: added rules/toggles[12345].rule<br />
<br />
type: contrib<br />
file: external<br />
desc: added patch for aircrack-ng to enable aircrack-ng dumping .hccap file<br />
<br />
type: contrib<br />
file: external<br />
desc: added alternative solution for converting: http://hashcat.net/cap2hccap<br />
<br />
type: contrib<br />
file: external<br />
desc: added configureable leetspeek.rule permutation generator script<br />
cred: lanjelot<br />
<br />
type: change<br />
file: host programs<br />
desc: recalibrated defaults so that kernels run fast but not to aggressive<br />
<br />
type: change<br />
file: host programs<br />
desc: changed speed display compressing threshold from 10000 to 100000<br />
<br />
type: change<br />
file: host programs<br />
desc: changed exit behaviour in case of invalid hash from exit to skip-only<br />
<br />
type: bug<br />
file: kernels (nvidia only)<br />
desc: fixed single-hash issue in MD4, NTLM and DCC kernels<br />
cred: http://hashcat.net/forum/thread-822.html<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed multi-hash issue in phpass kernel<br />
cred: http://hashcat.net/forum/thread-768.html<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed issue in multi-hash in DCC kernel<br />
<br />
type: bug<br />
file: kernels<br />
desc: fixed issue in gpu rule-engine in function "s"<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed issue when enabling pause mode in salted multihash cracking<br />
cred: San<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed calculating wrong progress issue in status display<br />
cred: http://hashcat.net/forum/thread-721.html<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed bug in --gpu-async which was not enabled even if specified<br />
<br />
type: bug<br />
file: host programs<br />
desc: fixed version string on startup<br />
cred: http://hashcat.net/forum/showthread.php?tid=470<br />
<br />
type: bug<br />
file: host programs<br />
desc: workarounded AMD issue ../../src/xcb_io.c:140: dequeue_pending_request<br />
cred: http://hashcat.net/forum/showthread.php?tid=462</code></div></div><br />
--<br />
atom<br />
<br />
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.05]]></title>
			<link>https://hashcat.net/forum/thread-406.html</link>
			<pubDate>Wed, 17 Aug 2011 08:14:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-406.html</guid>
			<description><![CDATA[This is a Bugfix Release!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
* changes v0.04 -&gt; v0.05:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: bug<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: fixed bug in --remove causing hashlists getting destroyed<br />
cred: http://hashcat.net/forum/thread-732.html</code></div></div><br />
--<br />
atom<br />
]]></description>
			<content:encoded><![CDATA[This is a Bugfix Release!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
* changes v0.04 -&gt; v0.05:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: bug<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: fixed bug in --remove causing hashlists getting destroyed<br />
cred: http://hashcat.net/forum/thread-732.html</code></div></div><br />
--<br />
atom<br />
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat-plus v0.04]]></title>
			<link>https://hashcat.net/forum/thread-404.html</link>
			<pubDate>Wed, 17 Aug 2011 08:12:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-404.html</guid>
			<description><![CDATA[Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
* changes v0.03 -&gt; v0.04:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: rename<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: renamed oclHashcat+ to oclHashcat-plus, cudaHashcat+ to cudaHashcat-plus<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported interactive status screen feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported ETA display feature from oclHashcat-lite v0.05<br />
refe: http://hashcat.net/forum/thread-515.html<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported pause / resume feature from oclHashcat-lite v0.05<br />
refe: http://hashcat.net/forum/thread-506.html<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported thermal watchdog feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported gpu-async feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported runtime-limit feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported remove feature from hashcat v0.36<br />
refe: http://hashcat.net/forum/thread-270.html<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported dictionary directory scan feature from hashcat v0.36<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: optimized loading huge rulesets and hashlists a lot<br />
refe: http://hashcat.net/forum/thread-522.html<br />
<br />
type: improvement<br />
file: kernels<br />
desc: merged -m 501 into -m 500. hashcat will automatically choose whats best<br />
<br />
type: improvement<br />
file: kernels<br />
desc: added -m 1500 = descrypt, DES(Unix), Traditional DES<br />
refe: http://hashcat.net/forum/thread-299.html<br />
<br />
type: improvement<br />
file: kernels<br />
desc: added -m 1600 = md5apr1, MD5(APR), Apache MD5<br />
refe: http://hashcat.net/forum/thread-163.html<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v11.4 and SDK 2.4<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare v270.x<br />
<br />
type: improvement<br />
file: kernels<br />
desc: added support for BeaverCreek, Caicos, Turks, WinterPark GPU's<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: backported BFI_INT binary patching hack from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase MD5 +17.5% : 4673M/s -&gt; 5665M/s<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase phpass +23.5% : 2247k/s -&gt; 2935k/s<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase md5crypt +11.1% : 3378k/s -&gt; 3800k/s<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase NTLM +13.4% : 6323M/s -&gt; 7222M/s<br />
<br />
type: bug<br />
file: oclHashcat-plus<br />
desc: DCC cracking in multi-hash mode was broken<br />
<br />
type: docs<br />
file: credits.txt<br />
desc: added credits file<br />
<br />
type: docs<br />
file: user_manuals.txt<br />
desc: added links to online documentation</code></div></div><br />
--<br />
atom<br />
]]></description>
			<content:encoded><![CDATA[Download it here: <a href="http://hashcat.net/oclhashcat-plus/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat-plus/</a><br />
<br />
* changes v0.03 -&gt; v0.04:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: rename<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: renamed oclHashcat+ to oclHashcat-plus, cudaHashcat+ to cudaHashcat-plus<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported interactive status screen feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported ETA display feature from oclHashcat-lite v0.05<br />
refe: http://hashcat.net/forum/thread-515.html<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported pause / resume feature from oclHashcat-lite v0.05<br />
refe: http://hashcat.net/forum/thread-506.html<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported thermal watchdog feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported gpu-async feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported runtime-limit feature from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported remove feature from hashcat v0.36<br />
refe: http://hashcat.net/forum/thread-270.html<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: backported dictionary directory scan feature from hashcat v0.36<br />
<br />
type: improvement<br />
file: oclHashcat-plus, cudaHashcat-plus<br />
desc: optimized loading huge rulesets and hashlists a lot<br />
refe: http://hashcat.net/forum/thread-522.html<br />
<br />
type: improvement<br />
file: kernels<br />
desc: merged -m 501 into -m 500. hashcat will automatically choose whats best<br />
<br />
type: improvement<br />
file: kernels<br />
desc: added -m 1500 = descrypt, DES(Unix), Traditional DES<br />
refe: http://hashcat.net/forum/thread-299.html<br />
<br />
type: improvement<br />
file: kernels<br />
desc: added -m 1600 = md5apr1, MD5(APR), Apache MD5<br />
refe: http://hashcat.net/forum/thread-163.html<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v11.4 and SDK 2.4<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for NVidia ForceWare v270.x<br />
<br />
type: improvement<br />
file: kernels<br />
desc: added support for BeaverCreek, Caicos, Turks, WinterPark GPU's<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: backported BFI_INT binary patching hack from oclHashcat-lite v0.05<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase MD5 +17.5% : 4673M/s -&gt; 5665M/s<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase phpass +23.5% : 2247k/s -&gt; 2935k/s<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase md5crypt +11.1% : 3378k/s -&gt; 3800k/s<br />
<br />
type: improvement<br />
file: kernels AMD<br />
desc: performance increase NTLM +13.4% : 6323M/s -&gt; 7222M/s<br />
<br />
type: bug<br />
file: oclHashcat-plus<br />
desc: DCC cracking in multi-hash mode was broken<br />
<br />
type: docs<br />
file: credits.txt<br />
desc: added credits file<br />
<br />
type: docs<br />
file: user_manuals.txt<br />
desc: added links to online documentation</code></div></div><br />
--<br />
atom<br />
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat+ v0.03]]></title>
			<link>https://hashcat.net/forum/thread-264.html</link>
			<pubDate>Mon, 31 Jan 2011 09:51:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-264.html</guid>
			<description><![CDATA[This is a Bugfix Release!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat+/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat+/</a><br />
<br />
* changes v0.02 -&gt; v0.03:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: bug<br />
file: oclHashcat+<br />
desc: md5crypt / phpass cracking in multi-hash mode was broken<br />
<br />
type: bug<br />
file: examples<br />
desc: MD5 example Script on windows, wrong hashlist filename<br />
<br />
type: bug<br />
file: examples<br />
desc: phpass example Script on windows, echo appends space to plaintext<br />
<br />
type: bug<br />
file: examples<br />
desc: stdin and stdout on windows was not switched to binary mode</code></div></div><br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[This is a Bugfix Release!<br />
<br />
Download it here: <a href="http://hashcat.net/oclhashcat+/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat+/</a><br />
<br />
* changes v0.02 -&gt; v0.03:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>type: bug<br />
file: oclHashcat+<br />
desc: md5crypt / phpass cracking in multi-hash mode was broken<br />
<br />
type: bug<br />
file: examples<br />
desc: MD5 example Script on windows, wrong hashlist filename<br />
<br />
type: bug<br />
file: examples<br />
desc: phpass example Script on windows, echo appends space to plaintext<br />
<br />
type: bug<br />
file: examples<br />
desc: stdin and stdout on windows was not switched to binary mode</code></div></div><br />
--<br />
atom]]></content:encoded>
		</item>
	</channel>
</rss>