<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - Old oclHashcat Announcements]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Thu, 09 Apr 2026 00:22:51 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[oclHashcat v2.00]]></title>
			<link>https://hashcat.net/forum/thread-4882.html</link>
			<pubDate>Fri, 04 Dec 2015 16:03:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-4882.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This oclHashcat version 2.00 is all about Open-Source. Yes, you read it right. We went Open-Source!<br />
<br />
If you want to read more about the background of this, you can find the details here: <a href="https://hashcat.net/forum/thread-4880.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-4880.html</a><br />
<br />
Beside that, there's also alot of changes from the previous version 1.37 to this version.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Most important changes</span><br />
<ul class="mycode_list"><li>Bitsliced GPU kernel of the DES based algorithms LM and DEScrypt<br />
</li>
<li>TrueCrypt cracker is now full-featured<br />
</li>
<li>Removed Timebomb-, Beta- and Keyfile- checks<br />
</li>
<li>Added support for all AMD Fiji based GPU (Fury)<br />
</li>
</ul>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Newly added algorithms</span><br />
<ul class="mycode_list"><li>Blockchain, My Wallet<br />
</li>
<li>MS-AzureSync PBKDF2-HMAC-SHA256<br />
</li>
</ul>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Bitsliced GPU kernel</span><br />
<br />
Bitsliced DES code was an important thing to add, many people were looking for this feature for a long time. If you want to know more about the details of how the implementation went you can read about the details here: <a href="https://hashcat.net/forum/thread-4761.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-4761.html</a><br />
<br />
But to shortcut it, the status is that -m 1500 (DEScrypt) and -m 3000 (LM) now both use bitsliced code for Brute-Forced attacks. Two more things will be done soon:<br />
<ul class="mycode_list"><li>Support for bitsliced Oracle-DES and RACF<br />
</li>
<li>Support for hardcoded salt in DEScrypt<br />
</li>
</ul>
Once we finish the hardcoded salt in DEScrypt we can expect even more performance. <br />
<br />
Make sure to monitor oclHashcat's GitHub repository if you're interested in this.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">TrueCrypt cracker</span><br />
<br />
The previous release version of oclHashcat (v1.37) was already able to crack TrueCrypt volumes, though it only is able to crack AES encrypted volumes. <br />
<br />
With oclHashcat v2.00 we added the following functionality:<br />
<ul class="mycode_list"><li>Crack Serpent<br />
</li>
<li>Crack Twofish<br />
</li>
<li>Crack cascaded ciphers<br />
</li>
<li>Crack keyfile-protected volumes<br />
</li>
</ul>
That means we finally have a full-featured TrueCrypt cracking engine. It supports all hashes, ciphers, cascades, keyfiles, hidden-volumes, bootable-devices in any possible combination.<br />
<br />
But beside that, we also found a way to speed up TrueCrypt cracking massively!<br />
<br />
If you're interested in this, please read my post "Cracking eight different TrueCrypt ciphers for the price of three": <a href="https://hashcat.net/forum/thread-4812.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-4812.html</a><br />
<br />
ATM, oclHashcat is the only cracker able to perform this attack.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.37 -&gt; v2.00</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Project<br />
File: All<br />
Desc: Made the project Open-Source<br />
<br />
Type: Project<br />
File: All<br />
Desc: Switched the license to MIT<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Removed Timebomb-, Beta- and Keyfile- checks<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Added support for AMD APP SDK v3.0 GA<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Added support for AMD ADL 8.0<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for NV CUDA 7.5<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Replaced support for NVAPI with support for its successor GDK, starting with version 352.55<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Added support for all AMD Fiji based GPU (Fury)<br />
Trac: 677<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Bitsliced mode -m 1500 = crypt, DES(Unix), Traditional DES in mask mode<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Bitsliced mode -m 3000 = LM in mask mode<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12700 = Blockchain, My Wallet<br />
Trac: 645<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12800 = MS-AzureSync PBKDF2-HMAC-SHA256<br />
Trac: 669<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 6211 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS  512 bit<br />
Desc: Added new hash mode -m 6212 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1024 bit<br />
Desc: Added new hash mode -m 6213 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1536 bit<br />
Desc: Added new hash mode -m 6221 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512    + XTS  512 bit<br />
Desc: Added new hash mode -m 6222 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512    + XTS 1024 bit<br />
Desc: Added new hash mode -m 6223 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512    + XTS 1536 bit<br />
Desc: Added new hash mode -m 6231 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + XTS  512 bit<br />
Desc: Added new hash mode -m 6232 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + XTS 1024 bit<br />
Desc: Added new hash mode -m 6233 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + XTS 1536 bit<br />
Desc: Added new hash mode -m 6241 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS  512 bit + boot-mode<br />
Desc: Added new hash mode -m 6242 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1024 bit + boot-mode<br />
Desc: Added new hash mode -m 6243 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1536 bit + boot-mode<br />
Trac: 394<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for keyfiles with TrueCrypt 5.0+ for all modes<br />
Trac: 618<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added new status-display line showing Recovered/Time rate for current and average activity<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Hash-Modes 10900, 11900, 12000 and 12100 switched salt encoding from raw to base64<br />
Trac: #658<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Fine-tuned fanspeed regulation to work nice even on bigger systems (6+ GPU)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed rule 'x' to 'O', omit X chars of word at pos N<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Added rule 'x', extract X chars of word at pos N, to keep compatibility to JtR/crack<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Switched to newer glibc for binaries (testphase; please contact us if you have problems)<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: On Nvidia, do not use cuMemAllocHost() on CUDA systems with many GPUs to avoid errors of type cuMemAllocHost() 999<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: On Nvidia, make sure to clean constant buffer for each iteration of maskfiles<br />
Trac: 691<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: When trying to crack a raw hash with appended salt, the salt length was taken into account when calculating the number of bytes for the innerloop<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This oclHashcat version 2.00 is all about Open-Source. Yes, you read it right. We went Open-Source!<br />
<br />
If you want to read more about the background of this, you can find the details here: <a href="https://hashcat.net/forum/thread-4880.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-4880.html</a><br />
<br />
Beside that, there's also alot of changes from the previous version 1.37 to this version.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Most important changes</span><br />
<ul class="mycode_list"><li>Bitsliced GPU kernel of the DES based algorithms LM and DEScrypt<br />
</li>
<li>TrueCrypt cracker is now full-featured<br />
</li>
<li>Removed Timebomb-, Beta- and Keyfile- checks<br />
</li>
<li>Added support for all AMD Fiji based GPU (Fury)<br />
</li>
</ul>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Newly added algorithms</span><br />
<ul class="mycode_list"><li>Blockchain, My Wallet<br />
</li>
<li>MS-AzureSync PBKDF2-HMAC-SHA256<br />
</li>
</ul>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Bitsliced GPU kernel</span><br />
<br />
Bitsliced DES code was an important thing to add, many people were looking for this feature for a long time. If you want to know more about the details of how the implementation went you can read about the details here: <a href="https://hashcat.net/forum/thread-4761.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-4761.html</a><br />
<br />
But to shortcut it, the status is that -m 1500 (DEScrypt) and -m 3000 (LM) now both use bitsliced code for Brute-Forced attacks. Two more things will be done soon:<br />
<ul class="mycode_list"><li>Support for bitsliced Oracle-DES and RACF<br />
</li>
<li>Support for hardcoded salt in DEScrypt<br />
</li>
</ul>
Once we finish the hardcoded salt in DEScrypt we can expect even more performance. <br />
<br />
Make sure to monitor oclHashcat's GitHub repository if you're interested in this.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">TrueCrypt cracker</span><br />
<br />
The previous release version of oclHashcat (v1.37) was already able to crack TrueCrypt volumes, though it only is able to crack AES encrypted volumes. <br />
<br />
With oclHashcat v2.00 we added the following functionality:<br />
<ul class="mycode_list"><li>Crack Serpent<br />
</li>
<li>Crack Twofish<br />
</li>
<li>Crack cascaded ciphers<br />
</li>
<li>Crack keyfile-protected volumes<br />
</li>
</ul>
That means we finally have a full-featured TrueCrypt cracking engine. It supports all hashes, ciphers, cascades, keyfiles, hidden-volumes, bootable-devices in any possible combination.<br />
<br />
But beside that, we also found a way to speed up TrueCrypt cracking massively!<br />
<br />
If you're interested in this, please read my post "Cracking eight different TrueCrypt ciphers for the price of three": <a href="https://hashcat.net/forum/thread-4812.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-4812.html</a><br />
<br />
ATM, oclHashcat is the only cracker able to perform this attack.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.37 -&gt; v2.00</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Project<br />
File: All<br />
Desc: Made the project Open-Source<br />
<br />
Type: Project<br />
File: All<br />
Desc: Switched the license to MIT<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Removed Timebomb-, Beta- and Keyfile- checks<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Added support for AMD APP SDK v3.0 GA<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Added support for AMD ADL 8.0<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for NV CUDA 7.5<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Replaced support for NVAPI with support for its successor GDK, starting with version 352.55<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Added support for all AMD Fiji based GPU (Fury)<br />
Trac: 677<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Bitsliced mode -m 1500 = crypt, DES(Unix), Traditional DES in mask mode<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Bitsliced mode -m 3000 = LM in mask mode<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12700 = Blockchain, My Wallet<br />
Trac: 645<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12800 = MS-AzureSync PBKDF2-HMAC-SHA256<br />
Trac: 669<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 6211 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS  512 bit<br />
Desc: Added new hash mode -m 6212 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1024 bit<br />
Desc: Added new hash mode -m 6213 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1536 bit<br />
Desc: Added new hash mode -m 6221 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512    + XTS  512 bit<br />
Desc: Added new hash mode -m 6222 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512    + XTS 1024 bit<br />
Desc: Added new hash mode -m 6223 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512    + XTS 1536 bit<br />
Desc: Added new hash mode -m 6231 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + XTS  512 bit<br />
Desc: Added new hash mode -m 6232 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + XTS 1024 bit<br />
Desc: Added new hash mode -m 6233 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + XTS 1536 bit<br />
Desc: Added new hash mode -m 6241 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS  512 bit + boot-mode<br />
Desc: Added new hash mode -m 6242 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1024 bit + boot-mode<br />
Desc: Added new hash mode -m 6243 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + XTS 1536 bit + boot-mode<br />
Trac: 394<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for keyfiles with TrueCrypt 5.0+ for all modes<br />
Trac: 618<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added new status-display line showing Recovered/Time rate for current and average activity<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Hash-Modes 10900, 11900, 12000 and 12100 switched salt encoding from raw to base64<br />
Trac: #658<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Fine-tuned fanspeed regulation to work nice even on bigger systems (6+ GPU)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed rule 'x' to 'O', omit X chars of word at pos N<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Added rule 'x', extract X chars of word at pos N, to keep compatibility to JtR/crack<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Switched to newer glibc for binaries (testphase; please contact us if you have problems)<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: On Nvidia, do not use cuMemAllocHost() on CUDA systems with many GPUs to avoid errors of type cuMemAllocHost() 999<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: On Nvidia, make sure to clean constant buffer for each iteration of maskfiles<br />
Trac: 691<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: When trying to crack a raw hash with appended salt, the salt length was taken into account when calculating the number of bytes for the innerloop<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.37]]></title>
			<link>https://hashcat.net/forum/thread-4614.html</link>
			<pubDate>Tue, 18 Aug 2015 16:09:14 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-4614.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This oclHashcat version 1.37 is about driver compatibility and packaging but also on performance increase and new algorithms. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Most important changes</span><br />
<ul class="mycode_list"><li>AMD binary kernel format change enables oclHashcat to let the user select any catalyst driver version he wants, back to v14.9<br />
</li>
<li>NV binary kernel format change massively reduced disk usage, from 3236mb down to 894mb (includes newly added kernels)<br />
</li>
<li>Performance increases<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Performance increases</span><br />
<br />
We're very proud especially on the sha512crypt speed increase. You will also notice some multihash performance increase and a much smaller memory footprint because we fixed some memory leaks.<br />
<br />
<img src="https://hashcat.net/misc/p137_img/changes_v137_vliw1.png" loading="lazy"  alt="[Image: changes_v137_vliw1.png]" class="mycode_img" /><br />
<br />
There's a small drop on the performance for MD4/MD5/NTLM. This is a trade-off. The performance drop affects only Brute-Force, but therefore we gain 15% performance increase on rule-based attacks for all those very fast algorithms.<br />
<br />
Full performance changelog v1.36 -&gt; v1.37<br />
<br />
<a href="https://docs.google.com/spreadsheets/d/1-yj7Emc1X9PBNuUcdooVNlQzMz4sVISJtvytVv0PSuc/edit?usp=sharing" target="_blank" rel="noopener" class="mycode_url">https://docs.google.com/spreadsheets/d/1...sp=sharing</a><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Most important algorithms added</span><br />
<ul class="mycode_list"><li>eCryptfs<br />
</li>
<li>Oracle T: Type (Oracle 12+)<br />
</li>
<li>RAR3 (with encrypted header)<br />
</li>
</ul>
We also added some PBKDF2-HMAC-* generic hashes because of the strong request on this. Note that the RAR3 kernel only supports archives with encrypted headers yet. In a later version we will add support for RAR3 without encrypted headers and RAR5, too.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.36 -&gt; v1.37</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Host<br />
Desc: Added support for all AMD Catalyst &gt;= v14.9<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11700 = GOST R 34.11-2012 (Streebog) 256-bit<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11800 = GOST R 34.11-2012 (Streebog) 512-bit<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11900 = PBKDF2-HMAC-MD5<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12000 = PBKDF2-HMAC-SHA1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12100 = PBKDF2-HMAC-SHA512<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12200 = eCryptfs<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12300 = Oracle T: Type (Oracle 12+)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12400 = BSDiCrypt, Extended DES<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12500 = RAR3-hp<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12600 = ColdFusion 10+<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for longer field lengths in -m 11400 = SIP digest authentication (MD5)<br />
Trac: #539, #624<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Fixed digest size for all hash-types internally to 128 bit<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Fixed a bug in .hcmask file custom charset keyspace<br />
Trac: #617<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 112 = Oracle 11g/12c to -m 112 = Oracle S: Type (Oracle 11+)<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 3100 = Oracle 7-10g, DES(Oracle) to -m 3100 = Oracle H: Type (Oracle 7+)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 3800 = md5 (&#36;pass.&#36;salt.&#36;pass) to -m 3800 = md5 (&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 1100 = Domain Cached Credentials, mscash to -m 1100 = Domain Cached Credentials (DCC), MS Cache<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 2100 = Domain Cached Credentials2, mscash2 to -m 2100 = Domain Cached Credentials 2 (DCC2), MS Cache 2<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Reordered hash-type listing in usage screen and set default benchmark ordering anlogue to that listing<br />
<br />
Type: Change<br />
File: Host<br />
Desc: oclHashcat binaries are now being build on Ubuntu 15.04 (vivid)<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Loopback file names now also depend and the path contains a random number, not timestamp only<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug where the extra rules -j and -k were applied based on the wordlist-size not position<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed problem with --loopback that could sometimes lead to an infinite loop on windows<br />
Trac: #626<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This oclHashcat version 1.37 is about driver compatibility and packaging but also on performance increase and new algorithms. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">Most important changes</span><br />
<ul class="mycode_list"><li>AMD binary kernel format change enables oclHashcat to let the user select any catalyst driver version he wants, back to v14.9<br />
</li>
<li>NV binary kernel format change massively reduced disk usage, from 3236mb down to 894mb (includes newly added kernels)<br />
</li>
<li>Performance increases<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Performance increases</span><br />
<br />
We're very proud especially on the sha512crypt speed increase. You will also notice some multihash performance increase and a much smaller memory footprint because we fixed some memory leaks.<br />
<br />
<img src="https://hashcat.net/misc/p137_img/changes_v137_vliw1.png" loading="lazy"  alt="[Image: changes_v137_vliw1.png]" class="mycode_img" /><br />
<br />
There's a small drop on the performance for MD4/MD5/NTLM. This is a trade-off. The performance drop affects only Brute-Force, but therefore we gain 15% performance increase on rule-based attacks for all those very fast algorithms.<br />
<br />
Full performance changelog v1.36 -&gt; v1.37<br />
<br />
<a href="https://docs.google.com/spreadsheets/d/1-yj7Emc1X9PBNuUcdooVNlQzMz4sVISJtvytVv0PSuc/edit?usp=sharing" target="_blank" rel="noopener" class="mycode_url">https://docs.google.com/spreadsheets/d/1...sp=sharing</a><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Most important algorithms added</span><br />
<ul class="mycode_list"><li>eCryptfs<br />
</li>
<li>Oracle T: Type (Oracle 12+)<br />
</li>
<li>RAR3 (with encrypted header)<br />
</li>
</ul>
We also added some PBKDF2-HMAC-* generic hashes because of the strong request on this. Note that the RAR3 kernel only supports archives with encrypted headers yet. In a later version we will add support for RAR3 without encrypted headers and RAR5, too.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.36 -&gt; v1.37</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Host<br />
Desc: Added support for all AMD Catalyst &gt;= v14.9<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11700 = GOST R 34.11-2012 (Streebog) 256-bit<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11800 = GOST R 34.11-2012 (Streebog) 512-bit<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11900 = PBKDF2-HMAC-MD5<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12000 = PBKDF2-HMAC-SHA1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12100 = PBKDF2-HMAC-SHA512<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12200 = eCryptfs<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12300 = Oracle T: Type (Oracle 12+)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12400 = BSDiCrypt, Extended DES<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12500 = RAR3-hp<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 12600 = ColdFusion 10+<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for longer field lengths in -m 11400 = SIP digest authentication (MD5)<br />
Trac: #539, #624<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Fixed digest size for all hash-types internally to 128 bit<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Fixed a bug in .hcmask file custom charset keyspace<br />
Trac: #617<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 112 = Oracle 11g/12c to -m 112 = Oracle S: Type (Oracle 11+)<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 3100 = Oracle 7-10g, DES(Oracle) to -m 3100 = Oracle H: Type (Oracle 7+)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 3800 = md5 (&#36;pass.&#36;salt.&#36;pass) to -m 3800 = md5 (&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 1100 = Domain Cached Credentials, mscash to -m 1100 = Domain Cached Credentials (DCC), MS Cache<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 2100 = Domain Cached Credentials2, mscash2 to -m 2100 = Domain Cached Credentials 2 (DCC2), MS Cache 2<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Reordered hash-type listing in usage screen and set default benchmark ordering anlogue to that listing<br />
<br />
Type: Change<br />
File: Host<br />
Desc: oclHashcat binaries are now being build on Ubuntu 15.04 (vivid)<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Loopback file names now also depend and the path contains a random number, not timestamp only<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug where the extra rules -j and -k were applied based on the wordlist-size not position<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed problem with --loopback that could sometimes lead to an infinite loop on windows<br />
Trac: #626<br />
</span></blockquote>
<br />
<hr class="mycode_hr" />
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.36]]></title>
			<link>https://hashcat.net/forum/thread-4320.html</link>
			<pubDate>Sat, 25 Apr 2015 17:36:13 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2726">philsmd</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-4320.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download is here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.36 is a wild mix of nice updates <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Still, all oclHashcat versions back to 1.33 share the same driver dependencies for AMD. If you have a running oclHashcat v1.33 or newer then v1.36 will work, too, without a driver update.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Added new hash mode -m 11300 = Bitcoin/Litecoin wallet.dat<br />
</li>
<li>Added new hash mode -m 11600 = 7-Zip<br />
</li>
<li>Fixed a bug in NVidia multihash kernels: MD5, NTLM, IPB2<br />
</li>
<li>The parameters --show / --left do work with both halves of LM hashes (if they were 32 hex chars long)<br />
</li>
<li>Optimized final round flushing (reduces time at last percents of progress with slower speed)<br />
</li>
<li>Optimized rejection handling (for example passwords &gt; 8 if cracking DEScrypt or &lt; 8 if cracking WPA/WPA2, etc)<br />
</li>
<li>The speed in status display is no longer divide by the number of uncracked salts<br />
</li>
</ul>
<br />
Don't forget to visit the new FAQ pages, it's worth a read: <a href="https://hashcat.net/wiki/doku.php?id=frequently_asked_questions" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/wiki/doku.php?id=fre..._questions</a><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.35 -&gt; v1.36</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 346.59 driver<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11400 = SIP digest authentication (MD5)<br />
Trac: #539<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11300 = Bitcoin/Litecoin wallet.dat<br />
Trac: #434<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11500 = CRC32<br />
Trac: #532<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11600 = 7-Zip<br />
Trac: #532<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Optimized final round flushing (reduces time at last percents of progress with slower speed)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Optimized rejection handling (for example passwords &gt; 8 if cracking DEScrypt etc)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --bitmap-min to help loading huge hashlists faster<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: In status display, if a single hash is longer than 40 chars, truncate it and add "..." to it<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 3810 = md5(&#36;salt.&#36;pass.&#36;salt) to -m 3800 = md5(&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 4710 = sha1(&#36;salt.&#36;pass.&#36;salt) to -m 4900 = sha1(&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: The speed in status display is no longer divide by the number of uncracked salts<br />
<br />
Type: Change<br />
File: Host<br />
Desc: If all hashes bound to a salt are cracked, reduce the progress count of one salt from the total progress<br />
<br />
Type: Change<br />
File: Host<br />
Desc: --show/--left does now work with both halves of -m 3000 = LM hashes if they are 32 hex chars long<br />
Trac: #448<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a bug in NVidia multihash kernels: MD5, NTLM, IPB2<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Added additional checks for hexadecimal values supplied in masks by using the --hex-charset switch<br />
Trac: 610<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug in NVidia workload balancing<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug in single rule applied to each word from left dict<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Problem with "," character escaping in .hcmask file fixed<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug in -m 101, was showing a wrong cracked plaintext<br />
</span></blockquote>
]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download is here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.36 is a wild mix of nice updates <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Still, all oclHashcat versions back to 1.33 share the same driver dependencies for AMD. If you have a running oclHashcat v1.33 or newer then v1.36 will work, too, without a driver update.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Added new hash mode -m 11300 = Bitcoin/Litecoin wallet.dat<br />
</li>
<li>Added new hash mode -m 11600 = 7-Zip<br />
</li>
<li>Fixed a bug in NVidia multihash kernels: MD5, NTLM, IPB2<br />
</li>
<li>The parameters --show / --left do work with both halves of LM hashes (if they were 32 hex chars long)<br />
</li>
<li>Optimized final round flushing (reduces time at last percents of progress with slower speed)<br />
</li>
<li>Optimized rejection handling (for example passwords &gt; 8 if cracking DEScrypt or &lt; 8 if cracking WPA/WPA2, etc)<br />
</li>
<li>The speed in status display is no longer divide by the number of uncracked salts<br />
</li>
</ul>
<br />
Don't forget to visit the new FAQ pages, it's worth a read: <a href="https://hashcat.net/wiki/doku.php?id=frequently_asked_questions" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/wiki/doku.php?id=fre..._questions</a><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.35 -&gt; v1.36</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 346.59 driver<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11400 = SIP digest authentication (MD5)<br />
Trac: #539<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11300 = Bitcoin/Litecoin wallet.dat<br />
Trac: #434<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11500 = CRC32<br />
Trac: #532<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11600 = 7-Zip<br />
Trac: #532<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Optimized final round flushing (reduces time at last percents of progress with slower speed)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Optimized rejection handling (for example passwords &gt; 8 if cracking DEScrypt etc)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --bitmap-min to help loading huge hashlists faster<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: In status display, if a single hash is longer than 40 chars, truncate it and add "..." to it<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 3810 = md5(&#36;salt.&#36;pass.&#36;salt) to -m 3800 = md5(&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 4710 = sha1(&#36;salt.&#36;pass.&#36;salt) to -m 4900 = sha1(&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: The speed in status display is no longer divide by the number of uncracked salts<br />
<br />
Type: Change<br />
File: Host<br />
Desc: If all hashes bound to a salt are cracked, reduce the progress count of one salt from the total progress<br />
<br />
Type: Change<br />
File: Host<br />
Desc: --show/--left does now work with both halves of -m 3000 = LM hashes if they are 32 hex chars long<br />
Trac: #448<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a bug in NVidia multihash kernels: MD5, NTLM, IPB2<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Added additional checks for hexadecimal values supplied in masks by using the --hex-charset switch<br />
Trac: 610<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug in NVidia workload balancing<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug in single rule applied to each word from left dict<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Problem with "," character escaping in .hcmask file fixed<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug in -m 101, was showing a wrong cracked plaintext<br />
</span></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.35]]></title>
			<link>https://hashcat.net/forum/thread-4205.html</link>
			<pubDate>Sun, 22 Mar 2015 02:07:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-4205.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.35 is about performance increase and bug fixes. Even if you did not face any errors with v1.33 we recommend upgrading. <br />
<br />
Good thing is both oclHashcat v1.35 and oclHashcat v1.33 share the same driver dependancies. If you had a running v1.33 then v1.35 will work, too.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Increased speed for SHA1 raw kernels, all AMD GPU<br />
</li>
<li>Increased speed for PDF kernel, all NVidia GPU<br />
</li>
<li>Increased speed for all multihash kernel using a different bitmap technique, all GPU<br />
</li>
<li>Fixed a race condition in multihash kernels<br />
</li>
<li>Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
</li>
<li>Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.34 -&gt; v1.35</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for all multihash kernel using a bitmap technique<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a bug in NVidia multihash kernels that a hash was not found even with the correct plain<br />
</span></blockquote>
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.33 -&gt; v1.34</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for SHA1 raw kernels (-m 100/110/120/130/140) on GCN cards (7970, 280x, 290x, ...)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for PDF kernel (-m 104xx and -m 105xx) for all NVidia GPU<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for all multihash kernel using a different bitmap technique<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added oclHashcat compile timestamp to buffered binary kernels to avoid collisions with older versions<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11000 = PrestaShop<br />
Trac: #589<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11100 = PostgreSQL Challenge-Response Authentication (MD5)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11200 = MySQL Challenge-Response Authentication (SHA1)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for 32 bytes ID objects for hash type -m 10500 = PDF 1.4 - 1.6<br />
Trac: #594<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Inform user with small wordlists how to avoid slow speed with slow hashes<br />
Trac: #597<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 7100 = OS X v10.8 / v10.9 to OS X v10.8+<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: New workaround for -m 2500 = WPA/WPA2 key versions which are not valid (should always be &lt; 256)<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a race condition in multihash kernels<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
Trac: #591<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: The key size (AES 128 vs AES 256) for office 2007 hashes was not shown correctly in output/status<br />
Trac: #590<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug if a rule in -j changes the length of the words in the wordlist, ex. ]<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a crash when using the outfile remove feature together with some hash types<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a problem where wrong restore point percentage was shown<br />
Trac: #606<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a buffer overflow in stdin mode<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clEnqueueCopyBuffer() -30 Error by limiting --gpu-loops to a maximum of 1024<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug related to the maximum password length supported per hash-type<br />
</span></blockquote>
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.35 is about performance increase and bug fixes. Even if you did not face any errors with v1.33 we recommend upgrading. <br />
<br />
Good thing is both oclHashcat v1.35 and oclHashcat v1.33 share the same driver dependancies. If you had a running v1.33 then v1.35 will work, too.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Increased speed for SHA1 raw kernels, all AMD GPU<br />
</li>
<li>Increased speed for PDF kernel, all NVidia GPU<br />
</li>
<li>Increased speed for all multihash kernel using a different bitmap technique, all GPU<br />
</li>
<li>Fixed a race condition in multihash kernels<br />
</li>
<li>Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
</li>
<li>Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.34 -&gt; v1.35</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for all multihash kernel using a bitmap technique<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a bug in NVidia multihash kernels that a hash was not found even with the correct plain<br />
</span></blockquote>
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.33 -&gt; v1.34</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for SHA1 raw kernels (-m 100/110/120/130/140) on GCN cards (7970, 280x, 290x, ...)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for PDF kernel (-m 104xx and -m 105xx) for all NVidia GPU<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for all multihash kernel using a different bitmap technique<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added oclHashcat compile timestamp to buffered binary kernels to avoid collisions with older versions<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11000 = PrestaShop<br />
Trac: #589<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11100 = PostgreSQL Challenge-Response Authentication (MD5)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11200 = MySQL Challenge-Response Authentication (SHA1)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for 32 bytes ID objects for hash type -m 10500 = PDF 1.4 - 1.6<br />
Trac: #594<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Inform user with small wordlists how to avoid slow speed with slow hashes<br />
Trac: #597<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 7100 = OS X v10.8 / v10.9 to OS X v10.8+<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: New workaround for -m 2500 = WPA/WPA2 key versions which are not valid (should always be &lt; 256)<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a race condition in multihash kernels<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
Trac: #591<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: The key size (AES 128 vs AES 256) for office 2007 hashes was not shown correctly in output/status<br />
Trac: #590<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug if a rule in -j changes the length of the words in the wordlist, ex. ]<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a crash when using the outfile remove feature together with some hash types<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a problem where wrong restore point percentage was shown<br />
Trac: #606<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a buffer overflow in stdin mode<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clEnqueueCopyBuffer() -30 Error by limiting --gpu-loops to a maximum of 1024<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug related to the maximum password length supported per hash-type<br />
</span></blockquote>
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.34]]></title>
			<link>https://hashcat.net/forum/thread-4203.html</link>
			<pubDate>Sat, 21 Mar 2015 16:12:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-4203.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.34 is about performance increase and bug fixes. Even if you did not face any errors with v1.33 we recommend upgrading. <br />
<br />
Good thing is both oclHashcat v1.34 and oclHashcat v1.33 share the same driver dependancies. If you had a running v1.33 then v1.34 will work, too.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Increased speed for SHA1 raw kernels, all AMD GPU<br />
</li>
<li>Increased speed for PDF kernel, all NVidia GPU<br />
</li>
<li>Increased speed for all multihash kernel using a different bitmap technique, all GPU<br />
</li>
<li>Fixed a race condition in multihash kernels<br />
</li>
<li>Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
</li>
<li>Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.33 -&gt; v1.34</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for SHA1 raw kernels (-m 100/110/120/130/140) on GCN cards (7970, 280x, 290x, ...)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for PDF kernel (-m 104xx and -m 105xx) for all NVidia GPU<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for all multihash kernel using a different bitmap technique<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added oclHashcat compile timestamp to buffered binary kernels to avoid collisions with older versions<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11000 = PrestaShop<br />
Trac: #589<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11100 = PostgreSQL Challenge-Response Authentication (MD5)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11200 = MySQL Challenge-Response Authentication (SHA1)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for 32 bytes ID objects for hash type -m 10500 = PDF 1.4 - 1.6<br />
Trac: #594<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Inform user with small wordlists how to avoid slow speed with slow hashes<br />
Trac: #597<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 7100 = OS X v10.8 / v10.9 to OS X v10.8+<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: New workaround for -m 2500 = WPA/WPA2 key versions which are not valid (should always be &lt; 256)<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a race condition in multihash kernels<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
Trac: #591<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: The key size (AES 128 vs AES 256) for office 2007 hashes was not shown correctly in output/status<br />
Trac: #590<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug if a rule in -j changes the length of the words in the wordlist, ex. ]<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a crash when using the outfile remove feature together with some hash types<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a problem where wrong restore point percentage was shown<br />
Trac: #606<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a buffer overflow in stdin mode<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clEnqueueCopyBuffer() -30 Error by limiting --gpu-loops to a maximum of 1024<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug related to the maximum password length supported per hash-type<br />
</span></blockquote>
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.34 is about performance increase and bug fixes. Even if you did not face any errors with v1.33 we recommend upgrading. <br />
<br />
Good thing is both oclHashcat v1.34 and oclHashcat v1.33 share the same driver dependancies. If you had a running v1.33 then v1.34 will work, too.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Increased speed for SHA1 raw kernels, all AMD GPU<br />
</li>
<li>Increased speed for PDF kernel, all NVidia GPU<br />
</li>
<li>Increased speed for all multihash kernel using a different bitmap technique, all GPU<br />
</li>
<li>Fixed a race condition in multihash kernels<br />
</li>
<li>Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
</li>
<li>Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.33 -&gt; v1.34</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for SHA1 raw kernels (-m 100/110/120/130/140) on GCN cards (7970, 280x, 290x, ...)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for PDF kernel (-m 104xx and -m 105xx) for all NVidia GPU<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Increased speed for all multihash kernel using a different bitmap technique<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added oclHashcat compile timestamp to buffered binary kernels to avoid collisions with older versions<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11000 = PrestaShop<br />
Trac: #589<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11100 = PostgreSQL Challenge-Response Authentication (MD5)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added new hash mode -m 11200 = MySQL Challenge-Response Authentication (SHA1)<br />
Trac: #490<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for 32 bytes ID objects for hash type -m 10500 = PDF 1.4 - 1.6<br />
Trac: #594<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Inform user with small wordlists how to avoid slow speed with slow hashes<br />
Trac: #597<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 7100 = OS X v10.8 / v10.9 to OS X v10.8+<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: New workaround for -m 2500 = WPA/WPA2 key versions which are not valid (should always be &lt; 256)<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a race condition in multihash kernels<br />
<br />
Type: Bug<br />
File: Kernels<br />
Desc: Fixed a buffer overflow that could lead to all kinds of segmentation fault or system freezing<br />
Trac: #591<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: The key size (AES 128 vs AES 256) for office 2007 hashes was not shown correctly in output/status<br />
Trac: #590<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug if a rule in -j changes the length of the words in the wordlist, ex. ]<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a crash when using the outfile remove feature together with some hash types<br />
Trac: #593<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a problem where wrong restore point percentage was shown<br />
Trac: #606<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a buffer overflow in stdin mode<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clCreateBuffer() -61 Error even on single hashes<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug which caused clEnqueueCopyBuffer() -30 Error by limiting --gpu-loops to a maximum of 1024<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a bug related to the maximum password length supported per hash-type<br />
</span></blockquote>
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.33]]></title>
			<link>https://hashcat.net/forum/thread-4085.html</link>
			<pubDate>Mon, 16 Feb 2015 19:30:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-4085.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.33 is the finalized version of what v1.32 should have been. <br />
<br />
There's not much to see from the changelog but there was a ton of changes in the inner working which make this release is really a good one.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Support for cracking password protected PDF documents<br />
</li>
<li>Added a raw PBKDF2 kernel<br />
</li>
<li>A total of 150 algorithms is supported now<br />
</li>
<li>Multithreaded wordlist loading<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.32 -&gt; v1.33</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10400 = PDF 1.1 - 1.3 (Acrobat 2 - 4)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10410 = PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #1<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10420 = PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #2<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10500 = PDF 1.4 - 1.6 (Acrobat 5 - 8)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10600 = PDF 1.7 Level 3 (Acrobat 9)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10700 = PDF 1.7 Level 8 (Acrobat 10 - 11)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10900 = PBKDF2-HMAC-SHA256<br />
Trac: #256<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added support for cracking AES-256 in -m 9400 = Office 2007<br />
Trac: #576<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Multithreaded wordlist loader<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added last restore point information to status screen<br />
Trac: #445<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Support added to allow both {SSHA} and {ssha} signatures for -m 111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA<br />
Trac: #537<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Avoid using GPU_NUM_COMPUTE_RINGS to solve clGetDeviceIDs() -1 on some systems<br />
Trac: #564<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Beta key date check will now be disabled in release versions<br />
Trac: #536<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Minor change in exit code handling, priority of exit codes changed<br />
Trac: #545<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Solved a memory problem when using --show and --username with corrupted or missing user name<br />
Trac: #565<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a formatting problem when using the --username switch while cracking (colons were wrongly prepended to each line)<br />
Trac: #566<br />
</span></blockquote>
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.33 is the finalized version of what v1.32 should have been. <br />
<br />
There's not much to see from the changelog but there was a ton of changes in the inner working which make this release is really a good one.<br />
<br />
Most important changes:<br />
<ul class="mycode_list"><li>Support for cracking password protected PDF documents<br />
</li>
<li>Added a raw PBKDF2 kernel<br />
</li>
<li>A total of 150 algorithms is supported now<br />
</li>
<li>Multithreaded wordlist loading<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.32 -&gt; v1.33</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10400 = PDF 1.1 - 1.3 (Acrobat 2 - 4)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10410 = PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #1<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10420 = PDF 1.1 - 1.3 (Acrobat 2 - 4) + collider-mode #2<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10500 = PDF 1.4 - 1.6 (Acrobat 5 - 8)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10600 = PDF 1.7 Level 3 (Acrobat 9)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10700 = PDF 1.7 Level 8 (Acrobat 10 - 11)<br />
Trac: #160<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10900 = PBKDF2-HMAC-SHA256<br />
Trac: #256<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added support for cracking AES-256 in -m 9400 = Office 2007<br />
Trac: #576<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Multithreaded wordlist loader<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added last restore point information to status screen<br />
Trac: #445<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Support added to allow both {SSHA} and {ssha} signatures for -m 111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA<br />
Trac: #537<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Avoid using GPU_NUM_COMPUTE_RINGS to solve clGetDeviceIDs() -1 on some systems<br />
Trac: #564<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Beta key date check will now be disabled in release versions<br />
Trac: #536<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Minor change in exit code handling, priority of exit codes changed<br />
Trac: #545<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Solved a memory problem when using --show and --username with corrupted or missing user name<br />
Trac: #565<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a formatting problem when using the --username switch while cracking (colons were wrongly prepended to each line)<br />
Trac: #566<br />
</span></blockquote>
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.32]]></title>
			<link>https://hashcat.net/forum/thread-3979.html</link>
			<pubDate>Thu, 15 Jan 2015 15:38:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-3979.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.32 is a preponed release due to many conflicts between v1.31 and the latest AMD and NV drivers.<br />
<br />
It does not include support for PDF as we're not yet finished implementing all different versions of PDF. PDF will be supported in next version of oclHashcat.<br />
<br />
Still, there's a lot of other stuff that comes with this release. The most important:<br />
<ul class="mycode_list"><li>Workaround a bug which is caused by AMD Catalyst 14.9 driver that could lead to uncracked office documents<br />
</li>
<li>Mark AMD Catalyst 14.12 as entirely broken for OpenCL and show a warning message on startup<br />
</li>
<li>Support ForceWare 346.x to solve cuModuleLoad() 209 error -- Make sure you have 346.x installed !!!<br />
</li>
<li>Add support for Tesla K80 devices (sm_37) to solve cuModuleLoad() 301 error<br />
</li>
<li>New AMP kernels to compute passwords candidates for slow hashes on GPU as well<br />
</li>
<li>Increased scrypt performance<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.31 -&gt; v1.32</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Host<br />
Desc: Marked AMD Catalyst 14.12 as broken driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD APP SDK v3.0 beta<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 346.29 driver<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for NV CUDA 7.0<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV new GPUs: "sm_37", used in Tesla K80<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: NVidia dropped support for CUDA enabled cards &lt;= sm_13<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Removed bzero kernel as they are now supported by native runtime<br />
<br />
Type: Workaround<br />
File: Kernel<br />
Desc: Fixed bug in RC4 based algorithms like Office initiated by AMD drivers<br />
<br />
Type: Reimplementation<br />
File: Kernel and Host<br />
Desc: Rewrote slow hash candidate amplifiers, ported from CPU to GPU<br />
<br />
Type: Reimplementation<br />
File: Kernel<br />
Desc: Rewrote support for algorithm -m 8900 = scrypt, simply more speed<br />
Trac: #507<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added support for TrueCrypt 5.x containers in all hash modes -m 62XX<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 4710 = sha1(&#36;salt.&#36;pass.&#36;salt)<br />
Trac: #517<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10200 = Cram MD5<br />
Trac: #528<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10300 = SAP CODVN H (PWDSALTEDHASH) iSSHA-1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10800 = SHA384<br />
<br />
Type: Change<br />
File: Host<br />
Desc: renamed -m 123 = Django (SHA-1) to -m 124 = Django (SHA-1)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: renamed --powertune-disable to --powertune-enable and set default to unset<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --scrypt-tmto to manually override automatically calculated tmto settings<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed a bug when two rules in chaining-mode exceed maximum 15 functions calls in sum<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed a bug in -j if the rule causes to change password length<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed problem with ADL fan speed display, catalyst 14.9 driver had problems querying the fan information/speed<br />
Trac: #514<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed a problem with too aggressive plain rejection check<br />
Trac: #515<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: show error message when the user attempts to use directories in combinator attack (which is not supported)<br />
Trac: #518<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: show error message when the user tries to use too long masks, fixes a crash<br />
Trac: #522<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed Redmine format; support for 32 bytes of hexadecimal salt added<br />
Trac: #543<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a problem when using --remove with a multi-hccap file<br />
Trac: #552<br />
<br />
type: Feature<br />
file: Rules<br />
desc: added dive.rule<br />
Trac: #519<br />
</span></blockquote>
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
This version 1.32 is a preponed release due to many conflicts between v1.31 and the latest AMD and NV drivers.<br />
<br />
It does not include support for PDF as we're not yet finished implementing all different versions of PDF. PDF will be supported in next version of oclHashcat.<br />
<br />
Still, there's a lot of other stuff that comes with this release. The most important:<br />
<ul class="mycode_list"><li>Workaround a bug which is caused by AMD Catalyst 14.9 driver that could lead to uncracked office documents<br />
</li>
<li>Mark AMD Catalyst 14.12 as entirely broken for OpenCL and show a warning message on startup<br />
</li>
<li>Support ForceWare 346.x to solve cuModuleLoad() 209 error -- Make sure you have 346.x installed !!!<br />
</li>
<li>Add support for Tesla K80 devices (sm_37) to solve cuModuleLoad() 301 error<br />
</li>
<li>New AMP kernels to compute passwords candidates for slow hashes on GPU as well<br />
</li>
<li>Increased scrypt performance<br />
</li>
</ul>
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.31 -&gt; v1.32</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Host<br />
Desc: Marked AMD Catalyst 14.12 as broken driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD APP SDK v3.0 beta<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 346.29 driver<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for NV CUDA 7.0<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV new GPUs: "sm_37", used in Tesla K80<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: NVidia dropped support for CUDA enabled cards &lt;= sm_13<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: Removed bzero kernel as they are now supported by native runtime<br />
<br />
Type: Workaround<br />
File: Kernel<br />
Desc: Fixed bug in RC4 based algorithms like Office initiated by AMD drivers<br />
<br />
Type: Reimplementation<br />
File: Kernel and Host<br />
Desc: Rewrote slow hash candidate amplifiers, ported from CPU to GPU<br />
<br />
Type: Reimplementation<br />
File: Kernel<br />
Desc: Rewrote support for algorithm -m 8900 = scrypt, simply more speed<br />
Trac: #507<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added support for TrueCrypt 5.x containers in all hash modes -m 62XX<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 4710 = sha1(&#36;salt.&#36;pass.&#36;salt)<br />
Trac: #517<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10200 = Cram MD5<br />
Trac: #528<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10300 = SAP CODVN H (PWDSALTEDHASH) iSSHA-1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10800 = SHA384<br />
<br />
Type: Change<br />
File: Host<br />
Desc: renamed -m 123 = Django (SHA-1) to -m 124 = Django (SHA-1)<br />
<br />
Type: Change<br />
File: Host<br />
Desc: renamed --powertune-disable to --powertune-enable and set default to unset<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --scrypt-tmto to manually override automatically calculated tmto settings<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed a bug when two rules in chaining-mode exceed maximum 15 functions calls in sum<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed a bug in -j if the rule causes to change password length<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed problem with ADL fan speed display, catalyst 14.9 driver had problems querying the fan information/speed<br />
Trac: #514<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed a problem with too aggressive plain rejection check<br />
Trac: #515<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: show error message when the user attempts to use directories in combinator attack (which is not supported)<br />
Trac: #518<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: show error message when the user tries to use too long masks, fixes a crash<br />
Trac: #522<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed Redmine format; support for 32 bytes of hexadecimal salt added<br />
Trac: #543<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed a problem when using --remove with a multi-hccap file<br />
Trac: #552<br />
<br />
type: Feature<br />
file: Rules<br />
desc: added dive.rule<br />
Trac: #519<br />
</span></blockquote>
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.31]]></title>
			<link>https://hashcat.net/forum/thread-3710.html</link>
			<pubDate>Thu, 02 Oct 2014 19:22:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2726">philsmd</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-3710.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
oclHashcat v1.31 is the first oclHashcat version that fully supports the new Maxwell v2 GPUs from NVidia (GTX 970/980). There are a lot of request coming in about oclHashcat support for those cards as they are kind of special. If you want to know more about that, please read this:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-3687.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3687.html</a><br />
</li>
<li><a href="http://hashcat.net/forum/thread-3677.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3677.html</a><br />
</li>
</ul>
Therefore we decided to release the 1.31 version a bit sooner as the usual update frequency.<br />
<br />
<hr class="mycode_hr" />
<br />
We spend a lot of time (as always) in finding new optimizations and performance gains and it seems that it was worth the effort, see for instance the direct comparison of v1.20 and v1.31 for NVidia GTX Titan: <a href="http://hashcat.net/forum/thread-3707.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3707.html</a><br />
<br />
Furthermore, we've added support and optimized the kernels for AMD Catalyst 14.9 and NV ForceWare 343.22. Therefore it is required that you use that specific version of catalyst or ForceWare together with oclHashcat 1.31.<br />
<br />
<hr class="mycode_hr" />
<br />
New Algorithms:<br />
<ul class="mycode_list"><li>Office 2003 / 2007 / 2010 / 2013 documents<br />
</li>
<li>Cisco &#36;8&#36; (PBKDF2-SHA256) and &#36;9&#36; (scrypt)<br />
</li>
<li>Juniper IVE<br />
</li>
<li>SipHash<br />
</li>
<li>Django (PBKDF2-SHA256) <br />
</li>
<li>RAdmin2<br />
</li>
<li>md5(&#36;salt.&#36;pass.&#36;salt)<br />
</li>
<li>md5(strtoupper(md5(&#36;pass)))<br />
</li>
</ul>
<br />
We think the addition of Office 97/2003 algorithm is the most interesting one, at least from a forensics and pentesters perspective. For this hash-type, there's two ways (and hash types) to crack Office 97/2003 documents. That is either by searching for all collisions (see -m 9710/9720 and -m 9810/9820) or with the -m 9700/9800 "conventional" method. oclHashcat 1.31 supports all Office document types. For example it is not limited to doc/docx, it will work also on Microsoft Excel .xmlx, .pptx files etc.<br />
<br />
The new -m 9720 and -m 9820 mode will help you to find all "passwords" and they do not stop after the first crack. That's important if you want to know "all" matching passwords in case you're looking for a password you can use to test for password re-use. For more details about the addition of Office 97/2003 see <a href="http://hashcat.net/forum/thread-3665.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3665.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
As far as we know, oclHashcat is the first cracker to support cracking of the new Cisco hashing schemes (PBKDF2-SHA256 and scrypt) and the Juniper IVE hashes.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.30 -&gt; v1.31</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Host<br />
Desc: added support for AMD Catalyst 14.9<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for NV CUDA 6.5<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV new GPUs: "sm_52" (Maxwell v2), used in GTX 970/980<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 12 = PostgreSQL<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 123 = Django (SHA-1)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 501 = Juniper IVE<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 4300 = md5(strtoupper(md5(&#36;pass)))<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 3810 = md5(&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9200 = Cisco &#36;8&#36;<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9300 = Cisco &#36;9&#36;<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9400 = Office 2007<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9500 = Office 2010<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9600 = Office 2013<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9700 = MS Office &lt;= 2003 MD5 + RC4, oldoffice&#36;0, oldoffice&#36;1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9710 = MS Office &lt;= 2003 MD5 + RC4, collider-mode #1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9720 = MS Office &lt;= 2003 MD5 + RC4, collider-mode #2<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9800 = MS Office &lt;= 2003 SHA1 + RC4, oldoffice&#36;3, oldoffice&#36;4<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9810 = MS Office &lt;= 2003 SHA1 + RC4, collider-mode #1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9820 = MS Office &lt;= 2003 SHA1 + RC4, collider-mode #2<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9900 = Radmin2<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10000 = Django (PBKDF2-SHA256)<br />
Trac: #473<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10100 = SipHash<br />
Trac: #509<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: new feature to notice the user how many hashes were removed because of pot file remove feature<br />
Trac: #506<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: output the MAC address (BSSID) too when cracking WPA/WPA2, pot file output is different too<br />
Trac: #440<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 8800 = Android FDE to -m 8800 Android FDE &lt;= 4.3<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Removed docs/credits.txt<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed problem with ADL fan speed information; only happening on some non-reference design Overdrive6 GPUs<br />
Trac: #498<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed crash with --debug-mode=x when number of rules was exactly 14 (approaching maximum amount of rules allowed)<br />
Trac: #505<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed inconsistency when using --show together with --username and different --outfile-format options<br />
Trac: #513<br />
</span></blockquote>
]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
oclHashcat v1.31 is the first oclHashcat version that fully supports the new Maxwell v2 GPUs from NVidia (GTX 970/980). There are a lot of request coming in about oclHashcat support for those cards as they are kind of special. If you want to know more about that, please read this:<br />
<ul class="mycode_list"><li><a href="http://hashcat.net/forum/thread-3687.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3687.html</a><br />
</li>
<li><a href="http://hashcat.net/forum/thread-3677.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3677.html</a><br />
</li>
</ul>
Therefore we decided to release the 1.31 version a bit sooner as the usual update frequency.<br />
<br />
<hr class="mycode_hr" />
<br />
We spend a lot of time (as always) in finding new optimizations and performance gains and it seems that it was worth the effort, see for instance the direct comparison of v1.20 and v1.31 for NVidia GTX Titan: <a href="http://hashcat.net/forum/thread-3707.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3707.html</a><br />
<br />
Furthermore, we've added support and optimized the kernels for AMD Catalyst 14.9 and NV ForceWare 343.22. Therefore it is required that you use that specific version of catalyst or ForceWare together with oclHashcat 1.31.<br />
<br />
<hr class="mycode_hr" />
<br />
New Algorithms:<br />
<ul class="mycode_list"><li>Office 2003 / 2007 / 2010 / 2013 documents<br />
</li>
<li>Cisco &#36;8&#36; (PBKDF2-SHA256) and &#36;9&#36; (scrypt)<br />
</li>
<li>Juniper IVE<br />
</li>
<li>SipHash<br />
</li>
<li>Django (PBKDF2-SHA256) <br />
</li>
<li>RAdmin2<br />
</li>
<li>md5(&#36;salt.&#36;pass.&#36;salt)<br />
</li>
<li>md5(strtoupper(md5(&#36;pass)))<br />
</li>
</ul>
<br />
We think the addition of Office 97/2003 algorithm is the most interesting one, at least from a forensics and pentesters perspective. For this hash-type, there's two ways (and hash types) to crack Office 97/2003 documents. That is either by searching for all collisions (see -m 9710/9720 and -m 9810/9820) or with the -m 9700/9800 "conventional" method. oclHashcat 1.31 supports all Office document types. For example it is not limited to doc/docx, it will work also on Microsoft Excel .xmlx, .pptx files etc.<br />
<br />
The new -m 9720 and -m 9820 mode will help you to find all "passwords" and they do not stop after the first crack. That's important if you want to know "all" matching passwords in case you're looking for a password you can use to test for password re-use. For more details about the addition of Office 97/2003 see <a href="http://hashcat.net/forum/thread-3665.html" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/forum/thread-3665.html</a><br />
<br />
<hr class="mycode_hr" />
<br />
As far as we know, oclHashcat is the first cracker to support cracking of the new Cisco hashing schemes (PBKDF2-SHA256 and scrypt) and the Juniper IVE hashes.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.30 -&gt; v1.31</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Host<br />
Desc: added support for AMD Catalyst 14.9<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for NV CUDA 6.5<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV new GPUs: "sm_52" (Maxwell v2), used in GTX 970/980<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 12 = PostgreSQL<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 123 = Django (SHA-1)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 501 = Juniper IVE<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 4300 = md5(strtoupper(md5(&#36;pass)))<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 3810 = md5(&#36;salt.&#36;pass.&#36;salt)<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9200 = Cisco &#36;8&#36;<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9300 = Cisco &#36;9&#36;<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9400 = Office 2007<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9500 = Office 2010<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9600 = Office 2013<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9700 = MS Office &lt;= 2003 MD5 + RC4, oldoffice&#36;0, oldoffice&#36;1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9710 = MS Office &lt;= 2003 MD5 + RC4, collider-mode #1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9720 = MS Office &lt;= 2003 MD5 + RC4, collider-mode #2<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9800 = MS Office &lt;= 2003 SHA1 + RC4, oldoffice&#36;3, oldoffice&#36;4<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9810 = MS Office &lt;= 2003 SHA1 + RC4, collider-mode #1<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9820 = MS Office &lt;= 2003 SHA1 + RC4, collider-mode #2<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 9900 = Radmin2<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10000 = Django (PBKDF2-SHA256)<br />
Trac: #473<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: added new hash mode -m 10100 = SipHash<br />
Trac: #509<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: new feature to notice the user how many hashes were removed because of pot file remove feature<br />
Trac: #506<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: output the MAC address (BSSID) too when cracking WPA/WPA2, pot file output is different too<br />
Trac: #440<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed -m 8800 = Android FDE to -m 8800 Android FDE &lt;= 4.3<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Removed docs/credits.txt<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed problem with ADL fan speed information; only happening on some non-reference design Overdrive6 GPUs<br />
Trac: #498<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed crash with --debug-mode=x when number of rules was exactly 14 (approaching maximum amount of rules allowed)<br />
Trac: #505<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed inconsistency when using --show together with --username and different --outfile-format options<br />
Trac: #513<br />
</span></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.30]]></title>
			<link>https://hashcat.net/forum/thread-3627.html</link>
			<pubDate>Thu, 21 Aug 2014 15:48:44 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-3627.html</guid>
			<description><![CDATA[Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
This release is again focused on performance increase of the kernels and bugfixes. However, the most code intensive change in this version was the new workload dispatcher as it's part of the the oclHashcat core. The old one wasn't that bad, but the new one is simply faster which adds up to the increased performance of the kernels.<br />
<br />
As always, make sure to unpack into a new folder. Never reuse an existing oclHashcat folder (because of the cached kernels).<br />
<br />
One important thing for AMD users: You will need to update to the latest beta version of catalyst before updating oclHashcat. We've decided to no longer wait for AMD to ship the latest "stable" catalyst driver simply because they aren't any more stable than beta drivers...<br />
<br />
There's also one change made to the binaries itself. We now are using our own toolchain (thanks to crosstool-ng) to create our own binaries with an older glibc. That was required to make the binaries compatible to linux distributions using an older glibc. That means you should be able to run cudaHashcat and oclHashcat now without glibc patching on The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali), some (older) Debian systems, CentOS 6.4, etc..<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">New algorithms</span><br />
<hr class="mycode_hr" />
<ul class="mycode_list"><li>Skype<br />
</li>
<li>Peoplesoft<br />
</li>
<li>md5(&#36;salt.md5(&#36;pass))<br />
</li>
<li>Mediawiki B type<br />
</li>
<li>Kerberos 5 AS-REQ Pre-Auth etype 23 as fast algorithm (reimplementation)<br />
</li>
<li>Android FDE<br />
</li>
<li>scrypt<br />
</li>
<li>Password Safe v2<br />
</li>
<li>Lotus Notes/Domino 8<br />
</li>
</ul>
<br />
<span style="text-decoration: underline;" class="mycode_u">Skype</span> and <span style="text-decoration: underline;" class="mycode_u">Peoplesoft</span> are just new parsers as you were already able to crack them with older oclHashcat versions by using the generic hashtypes and by formating the hashes in a way that oclHashcat can load them. By adding parsers we just make it more comfortable for the users to load the hashes as you can use them in their native output.<br />
<br />
The <span style="text-decoration: underline;" class="mycode_u">md5(&#36;salt.md5(&#36;pass))</span> generic algorithm was simply added as it was required for the <span style="text-decoration: underline;" class="mycode_u">Mediawiki B</span> type hash-type. It's a simple scheme that does not require any special comment.<br />
<br />
The <span style="text-decoration: underline;" class="mycode_u">Kerberos 5</span> algorithm is a reimplementation as fast algorithm type. That is the case if an algorithm is fast enough to require an on-gpu candidate generator. The algorithm actually was fast enough and just by not selecting it as fast hash it lost some performance. By switching it to a fast type we got some speedup for free.<br />
<br />
Now it gets interessing. The <span style="text-decoration: underline;" class="mycode_u">Android FDE</span> algorithm that was added is the one that is using PBKDF2-HMAC-SHA1 + CBC-ESSIV-AES with 2000 iterations. Only tricky part was the "detection" of a filesystem. Note that this algorithm isn't used anymore in newer android devices. The new one uses scrypt instead of PBKDF2. For details about how the algorithm is working see here: <a href="https://hashcat.net/forum/thread-2270.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-2270.html</a><br />
<br />
That's why we've added <span style="text-decoration: underline;" class="mycode_u">scrypt</span> to GPU. And what should I tell, it's PITA. The goal of scrypt to run slow on GPU has been fulfilled. Just one note about that. The intention (if I understood currectly) was to make the computuation slow because the memory access is slow. Well that's not what made it slow actually. It's simply the lack of the total memory available on the card. Note that, to run fast with GPGPU, you have to run many tasks in parallel. That means that you have to allocate a huge amount of memory for each parallel task and this is what kills the gpu, not the access time. Also note that this scrypt variant is the real scrypt, not the minimal version that is used for litecoin. The litecoin version uses extreme low settings for N, r and p such that it is not required to work on global memory for all operations. We're using a fully functional scrypt in which you can set N, r and p dynamically. For the benchmark, we're using the defaults of 16k, 8, 1.<br />
<br />
The <span style="text-decoration: underline;" class="mycode_u">Password Safe v2</span> was also very interessting. This algorithm actually runs slower than the current one used in Password Safe v3, which is also supported with hash-type 5200. On my AMD hd7970, the v2 version runs with 101 kH/s while the v3 version runs with 506.2 kH/s but I don't think it's too much of a problem. Both run slow enough and are salted.<br />
<br />
Last algorithm that was added is <span style="text-decoration: underline;" class="mycode_u">Lotus Notes/Domino 8</span> which was discovered by our own philsmd. Therefore, oclHashcat v1.30 is world's first Lotus Notes/Domino 8 (H-hashes) cracker! For details about how the algorithm is working see here: <a href="https://hashcat.net/forum/thread-3550.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-3550.html</a><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Performance increase</span><br />
<hr class="mycode_hr" />
<br />
We've added some very special GPU type specific instructions that gave the speed boost. This means the increase of the performance depends on the GPU type. Every GPU type required different changes. It's mostly those chipsets that make the differences in cracking speed, after subtracting the effect that the shader count and clock stepping has. <br />
<br />
In other words: Lookup your chipset, then you can apply the percentage change on your current speed with oclHashcat v1.21:<br />
<br />
For our Test we used (all stock clocked):<br />
<br />
VLIW1: R9 290x<br />
VLIW4: hd6990 (only 1st core)<br />
VLIW5: hd5770<br />
<br />
sm_50: gtx 750Ti<br />
sm_21: gtx 560Ti<br />
sm_20: gtx 580<br />
<br />
<br />
<span style="text-decoration: underline;" class="mycode_u">AMD VLIW1 (R9 * and hd7* series, state of the art)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_vliw1.png" loading="lazy"  alt="[Image: changes_v130_vliw1.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">AMD VLIW4 (most of the hd6* series)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_vliw4.png" loading="lazy"  alt="[Image: changes_v130_vliw4.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">AMD VLIW5 (most of the hd5* series)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_vliw5.png" loading="lazy"  alt="[Image: changes_v130_vliw5.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">NVidia sm_50 (Maxwell chipset, ex: 750Ti, future state of the art)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_sm50.png" loading="lazy"  alt="[Image: changes_v130_sm50.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">NVidia sm_21 (Older vector chipset)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_sm21.png" loading="lazy"  alt="[Image: changes_v130_sm21.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">NVidia sm_20 (Older scalar chipset)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_sm20.png" loading="lazy"  alt="[Image: changes_v130_sm20.png]" class="mycode_img" /><br />
<br />
some of the algorithms became a bit slower. That is mostly because of driver changes that we were unable to compensate with more efficient code. <br />
<br />
Here's the entire performance change table: <a href="https://hashcat.net/misc/p130_img/changes_v130.png" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/misc/p130_img/changes_v130.png</a><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.21 -&gt; v1.30</span><br />
<hr class="mycode_hr" />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD Catalyst v14.6 and v14.7 (beta) driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 340.24 driver<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for AMD ADL 7.0<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote dispatcher thread from scratch<br />
<br />
Type: Reimplementation<br />
File: Kernel<br />
Desc: Rewrote support for algorithm -m 7500 = Kerberos 5 AS-REQ Pre-Auth etype 23 as fast algorithm<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 23 = Skype<br />
Trac: #474<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 133 = PeopleSoft<br />
Trac: #419<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 3710 = md5(&#36;salt.md5(&#36;pass))<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 3711 = Mediawiki B type<br />
Trac: #410<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8800 = Android FDE<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 8900 = scrypt<br />
Trac: #295<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 9000 = Password Safe v2<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 9100 = Lotus Notes/Domino 8<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for --increment with attack-mode 6 and attack-mode 7<br />
Trac: #450<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 112 = Oracle 11g to -m 112 = Oracle 11g/12c<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 5200 = Password Safe SHA256 to -m 5200 = Password Safe v3<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 5800 = Samsung Android Password/PIN to -m 5800 = Android PIN<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: fixed bug in warp kernels were zero-byte leading plains are incorrectly displayed<br />
Trac: #428<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: fixed bug in SAP CODVN B (BCODE) misses correct password in rare cases<br />
Trac: #495<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: Enforce maximum password length for -m 8500 = RACF<br />
Trac: #431<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: Rule iNX = Insert character X at position N didn't allow to insert a character at the very end of the plain<br />
Trac: #457<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed bug in bitmap table leading to uncracked 64-bit based hashes if bitmap_size &gt; 0xffff<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Separator for -m 22 = Juniper Netscreen/SSG (ScreenOS) should always be ':', regardless of --separator<br />
Trac: #454<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed memory problem of rules_optimize tool<br />
Trac: #456<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed crash with --show when using hash types which use "long" salts, e.g. -m 5600<br />
Trac: #489<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed output problem when using --attack-mode 1/6/7, sometimes output was truncated <br />
Trac: #494<br />
<br />
Type: Bug<br />
File: Rules<br />
Desc: Reduced generated2.rule file to 64k (65536) rules<br />
Trac: #436<br />
</span></blockquote>
]]></description>
			<content:encoded><![CDATA[Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
This release is again focused on performance increase of the kernels and bugfixes. However, the most code intensive change in this version was the new workload dispatcher as it's part of the the oclHashcat core. The old one wasn't that bad, but the new one is simply faster which adds up to the increased performance of the kernels.<br />
<br />
As always, make sure to unpack into a new folder. Never reuse an existing oclHashcat folder (because of the cached kernels).<br />
<br />
One important thing for AMD users: You will need to update to the latest beta version of catalyst before updating oclHashcat. We've decided to no longer wait for AMD to ship the latest "stable" catalyst driver simply because they aren't any more stable than beta drivers...<br />
<br />
There's also one change made to the binaries itself. We now are using our own toolchain (thanks to crosstool-ng) to create our own binaries with an older glibc. That was required to make the binaries compatible to linux distributions using an older glibc. That means you should be able to run cudaHashcat and oclHashcat now without glibc patching on The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali), some (older) Debian systems, CentOS 6.4, etc..<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">New algorithms</span><br />
<hr class="mycode_hr" />
<ul class="mycode_list"><li>Skype<br />
</li>
<li>Peoplesoft<br />
</li>
<li>md5(&#36;salt.md5(&#36;pass))<br />
</li>
<li>Mediawiki B type<br />
</li>
<li>Kerberos 5 AS-REQ Pre-Auth etype 23 as fast algorithm (reimplementation)<br />
</li>
<li>Android FDE<br />
</li>
<li>scrypt<br />
</li>
<li>Password Safe v2<br />
</li>
<li>Lotus Notes/Domino 8<br />
</li>
</ul>
<br />
<span style="text-decoration: underline;" class="mycode_u">Skype</span> and <span style="text-decoration: underline;" class="mycode_u">Peoplesoft</span> are just new parsers as you were already able to crack them with older oclHashcat versions by using the generic hashtypes and by formating the hashes in a way that oclHashcat can load them. By adding parsers we just make it more comfortable for the users to load the hashes as you can use them in their native output.<br />
<br />
The <span style="text-decoration: underline;" class="mycode_u">md5(&#36;salt.md5(&#36;pass))</span> generic algorithm was simply added as it was required for the <span style="text-decoration: underline;" class="mycode_u">Mediawiki B</span> type hash-type. It's a simple scheme that does not require any special comment.<br />
<br />
The <span style="text-decoration: underline;" class="mycode_u">Kerberos 5</span> algorithm is a reimplementation as fast algorithm type. That is the case if an algorithm is fast enough to require an on-gpu candidate generator. The algorithm actually was fast enough and just by not selecting it as fast hash it lost some performance. By switching it to a fast type we got some speedup for free.<br />
<br />
Now it gets interessing. The <span style="text-decoration: underline;" class="mycode_u">Android FDE</span> algorithm that was added is the one that is using PBKDF2-HMAC-SHA1 + CBC-ESSIV-AES with 2000 iterations. Only tricky part was the "detection" of a filesystem. Note that this algorithm isn't used anymore in newer android devices. The new one uses scrypt instead of PBKDF2. For details about how the algorithm is working see here: <a href="https://hashcat.net/forum/thread-2270.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-2270.html</a><br />
<br />
That's why we've added <span style="text-decoration: underline;" class="mycode_u">scrypt</span> to GPU. And what should I tell, it's PITA. The goal of scrypt to run slow on GPU has been fulfilled. Just one note about that. The intention (if I understood currectly) was to make the computuation slow because the memory access is slow. Well that's not what made it slow actually. It's simply the lack of the total memory available on the card. Note that, to run fast with GPGPU, you have to run many tasks in parallel. That means that you have to allocate a huge amount of memory for each parallel task and this is what kills the gpu, not the access time. Also note that this scrypt variant is the real scrypt, not the minimal version that is used for litecoin. The litecoin version uses extreme low settings for N, r and p such that it is not required to work on global memory for all operations. We're using a fully functional scrypt in which you can set N, r and p dynamically. For the benchmark, we're using the defaults of 16k, 8, 1.<br />
<br />
The <span style="text-decoration: underline;" class="mycode_u">Password Safe v2</span> was also very interessting. This algorithm actually runs slower than the current one used in Password Safe v3, which is also supported with hash-type 5200. On my AMD hd7970, the v2 version runs with 101 kH/s while the v3 version runs with 506.2 kH/s but I don't think it's too much of a problem. Both run slow enough and are salted.<br />
<br />
Last algorithm that was added is <span style="text-decoration: underline;" class="mycode_u">Lotus Notes/Domino 8</span> which was discovered by our own philsmd. Therefore, oclHashcat v1.30 is world's first Lotus Notes/Domino 8 (H-hashes) cracker! For details about how the algorithm is working see here: <a href="https://hashcat.net/forum/thread-3550.html" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/forum/thread-3550.html</a><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Performance increase</span><br />
<hr class="mycode_hr" />
<br />
We've added some very special GPU type specific instructions that gave the speed boost. This means the increase of the performance depends on the GPU type. Every GPU type required different changes. It's mostly those chipsets that make the differences in cracking speed, after subtracting the effect that the shader count and clock stepping has. <br />
<br />
In other words: Lookup your chipset, then you can apply the percentage change on your current speed with oclHashcat v1.21:<br />
<br />
For our Test we used (all stock clocked):<br />
<br />
VLIW1: R9 290x<br />
VLIW4: hd6990 (only 1st core)<br />
VLIW5: hd5770<br />
<br />
sm_50: gtx 750Ti<br />
sm_21: gtx 560Ti<br />
sm_20: gtx 580<br />
<br />
<br />
<span style="text-decoration: underline;" class="mycode_u">AMD VLIW1 (R9 * and hd7* series, state of the art)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_vliw1.png" loading="lazy"  alt="[Image: changes_v130_vliw1.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">AMD VLIW4 (most of the hd6* series)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_vliw4.png" loading="lazy"  alt="[Image: changes_v130_vliw4.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">AMD VLIW5 (most of the hd5* series)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_vliw5.png" loading="lazy"  alt="[Image: changes_v130_vliw5.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">NVidia sm_50 (Maxwell chipset, ex: 750Ti, future state of the art)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_sm50.png" loading="lazy"  alt="[Image: changes_v130_sm50.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">NVidia sm_21 (Older vector chipset)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_sm21.png" loading="lazy"  alt="[Image: changes_v130_sm21.png]" class="mycode_img" /><br />
<br />
<span style="text-decoration: underline;" class="mycode_u">NVidia sm_20 (Older scalar chipset)</span><br />
<br />
<img src="https://hashcat.net/misc/p130_img/changes_v130_sm20.png" loading="lazy"  alt="[Image: changes_v130_sm20.png]" class="mycode_img" /><br />
<br />
some of the algorithms became a bit slower. That is mostly because of driver changes that we were unable to compensate with more efficient code. <br />
<br />
Here's the entire performance change table: <a href="https://hashcat.net/misc/p130_img/changes_v130.png" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/misc/p130_img/changes_v130.png</a><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Full changelog v1.21 -&gt; v1.30</span><br />
<hr class="mycode_hr" />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD Catalyst v14.6 and v14.7 (beta) driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 340.24 driver<br />
<br />
Type: Driver<br />
File: Host<br />
Desc: added support for AMD ADL 7.0<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote dispatcher thread from scratch<br />
<br />
Type: Reimplementation<br />
File: Kernel<br />
Desc: Rewrote support for algorithm -m 7500 = Kerberos 5 AS-REQ Pre-Auth etype 23 as fast algorithm<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 23 = Skype<br />
Trac: #474<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 133 = PeopleSoft<br />
Trac: #419<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 3710 = md5(&#36;salt.md5(&#36;pass))<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 3711 = Mediawiki B type<br />
Trac: #410<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8800 = Android FDE<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 8900 = scrypt<br />
Trac: #295<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 9000 = Password Safe v2<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 9100 = Lotus Notes/Domino 8<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for --increment with attack-mode 6 and attack-mode 7<br />
Trac: #450<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 112 = Oracle 11g to -m 112 = Oracle 11g/12c<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 5200 = Password Safe SHA256 to -m 5200 = Password Safe v3<br />
<br />
Type: Change<br />
File: Kernel<br />
Desc: Renamed -m 5800 = Samsung Android Password/PIN to -m 5800 = Android PIN<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: fixed bug in warp kernels were zero-byte leading plains are incorrectly displayed<br />
Trac: #428<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: fixed bug in SAP CODVN B (BCODE) misses correct password in rare cases<br />
Trac: #495<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: Enforce maximum password length for -m 8500 = RACF<br />
Trac: #431<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: Rule iNX = Insert character X at position N didn't allow to insert a character at the very end of the plain<br />
Trac: #457<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed bug in bitmap table leading to uncracked 64-bit based hashes if bitmap_size &gt; 0xffff<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Separator for -m 22 = Juniper Netscreen/SSG (ScreenOS) should always be ':', regardless of --separator<br />
Trac: #454<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed memory problem of rules_optimize tool<br />
Trac: #456<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed crash with --show when using hash types which use "long" salts, e.g. -m 5600<br />
Trac: #489<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: fixed output problem when using --attack-mode 1/6/7, sometimes output was truncated <br />
Trac: #494<br />
<br />
Type: Bug<br />
File: Rules<br />
Desc: Reduced generated2.rule file to 64k (65536) rules<br />
Trac: #436<br />
</span></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.21]]></title>
			<link>https://hashcat.net/forum/thread-3422.html</link>
			<pubDate>Mon, 26 May 2014 14:27:29 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-3422.html</guid>
			<description><![CDATA[Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
This release is focused on performance increase / bugfixes<br />
<br />
As always, make sure to unpack into a new folder. Never reuse an existing oclHashcat folder (because of the cached kernels).<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added Algorithms</span><br />
<hr class="mycode_hr" />
<ul class="mycode_list"><li>PHPS<br />
</li>
<li>Lotus Notes/Domino 5<br />
</li>
<li>Lotus Notes/Domino 6<br />
</li>
</ul>
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Logging support</span><br />
<hr class="mycode_hr" />
<br />
There's a new basic logfile support. It's just a start to find out if users like it or not. The log file is fomatted in a way that it is easily readable by human. The format hence is easy to parse too, each line contains a key-value pair separated by a tab character.<br />
<br />
There will be more attributes coming in over time such as statistical information as speed and other useful information like cracked hashes. At this time, it's mostly default values, user-changed parameters, filenames of dictionary and hash.<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Performance increase: New sm_50 instructions, NVidia only</span><br />
<hr class="mycode_hr" />
<br />
With the GTX 750ti model, NVidia made an extreme move into our direction. This is the first card that supports the new sm_50 low-level instructions. For detailed information about the new sm_50 instructions, Ivan Golubev wrote an excellent blog post on here: <a href="https://www.golubev.com/blog/?p=291" target="_blank" rel="noopener" class="mycode_url">https://www.golubev.com/blog/?p=291</a><br />
<br />
To make it short, in the past AMD had a strong advantage over NVidia with their instructions BFI_INT and BIT_ALIGN. Those instructions are very useful in crypto. NVidia draw the level with the new LOP3.LUT and the SHF instruction (that was already introduced with sm_35).<br />
<br />
Actually, the LOP3.LUT has advantage over BFI_INT. It's much more flexible and can be used in other cases as well. Additionally, NVidia added another instruction "IADD3" that can add 3 integers all at once and store the result in a fourth integer. This instruction is also very useful in crypto.<br />
<br />
The GTX 750ti is a low-budget card, but with the next high-end card that bases on sm_50 NVidia it could be a game-changer. Also note that NVidia has much better multihash performance, not to mention the driver...<br />
<br />
Here's how performance increased with the new low-level optimizations (yes, they will work with any other future high-end sm_50 card):<br />
<br />
<img src="https://hashcat.net/misc/p121_img/changes_sm50.png" loading="lazy"  alt="[Image: changes_sm50.png]" class="mycode_img" /><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Performance increase: Workaround bad integration of 64-bit integer operations, AMD and NVidia</span><br />
<hr class="mycode_hr" />
<br />
All the 64-bit based algorithms like SHA512, Keccak etc dropped in performance with each new driver a little bit. So it was hard to notice. GPUs instructions operate still on 32-bit only, so the 64-bit mode is emulated. But the way how it is emulated was somehow broken. I was able to pinpoint the problem where the biggest drop came from and I managed to workaround it. For NVidia it took me a little PTX hack, for AMD luckily there was no binary hack required. While this optimization is not for all algorithm as the sm_50 optimization was, therefore it works on all cards, not just the sm_50. Not much to say, let the numbers do the talk:<br />
<br />
Changes for GCN hd7xxx / R9 series<br />
<br />
<img src="https://hashcat.net/misc/p121_img/changes_vliw1.png" loading="lazy"  alt="[Image: changes_vliw1.png]" class="mycode_img" /><br />
<br />
Changes for hd5xxx / hd6xxx / Non-GCN hd7xxx series<br />
<br />
<img src="https://hashcat.net/misc/p121_img/changes_vliw4.png" loading="lazy"  alt="[Image: changes_vliw4.png]" class="mycode_img" /><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Full Changeset</span><br />
<hr class="mycode_hr" />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 2612 = PHPS<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8600 = Lotus Notes/Domino 5<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8700 = Lotus Notes/Domino 6<br />
<br />
Type: Workaround<br />
File: Kernel<br />
Desc: Fixed performance drop on descrypt, LM and oracle-old initiated by AMD drivers<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: Fixed problem with restoring ADL performance state when the clock size reported by the AMD driver didn't respect the clock step size<br />
Trac: #435<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: Fixed problem with setting ADL powertune value for r9 295x2 GPUs<br />
Trac: #438<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for writing logfiles<br />
Trac: #420<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --logfile-disable which should be self-explaining<br />
Trac: #420<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Dictstat is now no longer session dependent and will always be based on oclHashcat installation directory<br />
Trac: #437<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Use AMD custom profile settings instead of basing the AMD powertune/clock settings on maximum supported clock values<br />
Trac: #433<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed VLIW size calculated by compute capability was broken for sm_50 -&gt; cuModuleLoad() 301<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Make --runtime count relative to real attack start not program start<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed bug with fan speed handling, if fan speed is manually set to a high enought value (e.g. 100%) oclHashcat shouldn't change it <br />
Trac: #439<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Problem with username parsing (--username) was fixed<br />
Trac: #441<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed problem where IKE-PSK sha1/md5 (-m 5300/-m 5400) were wrongly recognized as shadow file formats<br />
Trac: #443<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed problem where the 'delete range' rule (xNM) did not allow to remove charaters at the very end of the word<br />
Trac: #444<br />
</span></blockquote>
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
This release is focused on performance increase / bugfixes<br />
<br />
As always, make sure to unpack into a new folder. Never reuse an existing oclHashcat folder (because of the cached kernels).<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added Algorithms</span><br />
<hr class="mycode_hr" />
<ul class="mycode_list"><li>PHPS<br />
</li>
<li>Lotus Notes/Domino 5<br />
</li>
<li>Lotus Notes/Domino 6<br />
</li>
</ul>
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Logging support</span><br />
<hr class="mycode_hr" />
<br />
There's a new basic logfile support. It's just a start to find out if users like it or not. The log file is fomatted in a way that it is easily readable by human. The format hence is easy to parse too, each line contains a key-value pair separated by a tab character.<br />
<br />
There will be more attributes coming in over time such as statistical information as speed and other useful information like cracked hashes. At this time, it's mostly default values, user-changed parameters, filenames of dictionary and hash.<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Performance increase: New sm_50 instructions, NVidia only</span><br />
<hr class="mycode_hr" />
<br />
With the GTX 750ti model, NVidia made an extreme move into our direction. This is the first card that supports the new sm_50 low-level instructions. For detailed information about the new sm_50 instructions, Ivan Golubev wrote an excellent blog post on here: <a href="https://www.golubev.com/blog/?p=291" target="_blank" rel="noopener" class="mycode_url">https://www.golubev.com/blog/?p=291</a><br />
<br />
To make it short, in the past AMD had a strong advantage over NVidia with their instructions BFI_INT and BIT_ALIGN. Those instructions are very useful in crypto. NVidia draw the level with the new LOP3.LUT and the SHF instruction (that was already introduced with sm_35).<br />
<br />
Actually, the LOP3.LUT has advantage over BFI_INT. It's much more flexible and can be used in other cases as well. Additionally, NVidia added another instruction "IADD3" that can add 3 integers all at once and store the result in a fourth integer. This instruction is also very useful in crypto.<br />
<br />
The GTX 750ti is a low-budget card, but with the next high-end card that bases on sm_50 NVidia it could be a game-changer. Also note that NVidia has much better multihash performance, not to mention the driver...<br />
<br />
Here's how performance increased with the new low-level optimizations (yes, they will work with any other future high-end sm_50 card):<br />
<br />
<img src="https://hashcat.net/misc/p121_img/changes_sm50.png" loading="lazy"  alt="[Image: changes_sm50.png]" class="mycode_img" /><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Performance increase: Workaround bad integration of 64-bit integer operations, AMD and NVidia</span><br />
<hr class="mycode_hr" />
<br />
All the 64-bit based algorithms like SHA512, Keccak etc dropped in performance with each new driver a little bit. So it was hard to notice. GPUs instructions operate still on 32-bit only, so the 64-bit mode is emulated. But the way how it is emulated was somehow broken. I was able to pinpoint the problem where the biggest drop came from and I managed to workaround it. For NVidia it took me a little PTX hack, for AMD luckily there was no binary hack required. While this optimization is not for all algorithm as the sm_50 optimization was, therefore it works on all cards, not just the sm_50. Not much to say, let the numbers do the talk:<br />
<br />
Changes for GCN hd7xxx / R9 series<br />
<br />
<img src="https://hashcat.net/misc/p121_img/changes_vliw1.png" loading="lazy"  alt="[Image: changes_vliw1.png]" class="mycode_img" /><br />
<br />
Changes for hd5xxx / hd6xxx / Non-GCN hd7xxx series<br />
<br />
<img src="https://hashcat.net/misc/p121_img/changes_vliw4.png" loading="lazy"  alt="[Image: changes_vliw4.png]" class="mycode_img" /><br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Full Changeset</span><br />
<hr class="mycode_hr" />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Feature<br />
File: Host<br />
Desc: Added support for algorithm -m 2612 = PHPS<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8600 = Lotus Notes/Domino 5<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8700 = Lotus Notes/Domino 6<br />
<br />
Type: Workaround<br />
File: Kernel<br />
Desc: Fixed performance drop on descrypt, LM and oracle-old initiated by AMD drivers<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: Fixed problem with restoring ADL performance state when the clock size reported by the AMD driver didn't respect the clock step size<br />
Trac: #435<br />
<br />
Type: Workaround<br />
File: Host<br />
Desc: Fixed problem with setting ADL powertune value for r9 295x2 GPUs<br />
Trac: #438<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for writing logfiles<br />
Trac: #420<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --logfile-disable which should be self-explaining<br />
Trac: #420<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Dictstat is now no longer session dependent and will always be based on oclHashcat installation directory<br />
Trac: #437<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Use AMD custom profile settings instead of basing the AMD powertune/clock settings on maximum supported clock values<br />
Trac: #433<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed VLIW size calculated by compute capability was broken for sm_50 -&gt; cuModuleLoad() 301<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Make --runtime count relative to real attack start not program start<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed bug with fan speed handling, if fan speed is manually set to a high enought value (e.g. 100%) oclHashcat shouldn't change it <br />
Trac: #439<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Problem with username parsing (--username) was fixed<br />
Trac: #441<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed problem where IKE-PSK sha1/md5 (-m 5300/-m 5400) were wrongly recognized as shadow file formats<br />
Trac: #443<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Fixed problem where the 'delete range' rule (xNM) did not allow to remove charaters at the very end of the word<br />
Trac: #444<br />
</span></blockquote>
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.20]]></title>
			<link>https://hashcat.net/forum/thread-3323.html</link>
			<pubDate>Sat, 26 Apr 2014 20:00:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-3323.html</guid>
			<description><![CDATA[Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
ACHTUNG! <br />
<br />
You will need to take some time to go through all of the release notes, as there are megatons of new features. Don't worry, it's mostly just additions, so you won't have to relearn oclHashcat's syntax all over again. However, many of the new feature require an explanation. You should know what they do, how they work, and how you can use them -- or at least, how we think you can use them.<br />
<br />
Our goal whenever we're adding these types of features is to nurture your creativity. You are not forced to use these features in exactly the same way we suggest. Actually, we hope that some of the new features enable your neurons to fire, and inspire you with new ideas of how you can design more efficient attacks, or simply to help make the task more comfortable.<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added algorithms</span><br />
<hr class="mycode_hr" />
<br />
Here's a quick overview about the newly-added hash types:<br />
<ul class="mycode_list"><li>Juniper Netscreen/SSG (ScreenOS)<br />
</li>
<li>MySQL323<br />
</li>
<li>MD5(SHA1())<br />
</li>
<li>Double SHA1<br />
</li>
<li>SHA1(MD5())<br />
</li>
<li>Cisco-ASA MD5<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES + hidden-volume<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-SHA512 + AES + hidden-volume<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-Whirlpool + AES + hidden-volume<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES + hidden-volume + boot-mode<br />
</li>
<li>IPMI2 RAKP HMAC-SHA1<br />
</li>
<li>Redmine<br />
</li>
<li>SAP CODVN B (BCODE)<br />
</li>
<li>SAP CODVN F/G (PASSCODE)<br />
</li>
<li>Drupal7<br />
</li>
<li>Sybase ASE<br />
</li>
<li>Citrix Netscaler<br />
</li>
<li>1Password, cloudkeychain<br />
</li>
<li>DNSSEC (NSEC3)<br />
</li>
<li>WBB3, Woltlab Burning Board 3<br />
</li>
<li>RACF<br />
</li>
</ul>
You should take a close look at the SAP-B (BCODE) algorithm. AFAIK this hash is still in use in many enterprise installations. This algorithm is clearly <span style="text-decoration: underline;" class="mycode_u">broken</span>! This is serious.<br />
<br />
Also see Frank Dittrich's original writeup about the algorithm at <a href="http://www.revision-online.info/index.php/Datei:SAP_Passwort_Update.pdf" target="_blank" rel="noopener" class="mycode_url">http://www.revision-online.info/index.ph...Update.pdf</a><br />
It does a decent job of explaining the weaknesses, but it was written in a time where there was no GPGPU-based cracking. Or at least, not for this algorithm.<br />
<br />
SAP-B passwords are limited to a keyspace of 69^8. With oclHashcat v1.20, a single R9 290x can crack a hash of this type with a rate of 850 MH/s (the hd7970 is at 560 MH/s). Therefore, 8 x R9 290x can crack -every- possible SAP-B password in max. 20 hours.<br />
<br />
The worst part about it is that the reduced keyspace is not just a matter of uppercasing the password like LM does, but it further replaces all characters outside the 0x20-0x80 ASCII range with 0xff. In other words, even if you use crazy keycodes in your password, it will be cracked in max. 20 hours. It's hopeless.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">AMD Catalyst v14.x (Mantle) driver</span><br />
<hr class="mycode_hr" />
<br />
The Mantle drivers have created some initial headaches for us. The main problem is that OpenCL binary kernels compiled for previous stable 13.x Catalyst drivers are incompatible with binary kernels compiled for Mantle drivers. So, it's not our fault that you are forced to update to Catalyst 14.x. More annoyingly, the 14.x drivers are also required if you are running Linux kernel 3.13+, so we really don't have a choice, do we?<br />
<br />
There is an upside to upgrading to the Mantle drives, though. The OpenCL JIT compiler was updated to produce more optimized low-level instructions for the GPU, which we as developeres have no access to when using OpenCL. This means that the JIT compiler is finally starting to become as optimized as our OpenCL kernels, which translates into a 23% performance gain for NTLM.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Improved distributed cracking support</span><br />
<hr class="mycode_hr" />
<br />
There have been a lot of different third-party approaches to distributed cracking with oclHashcat. The basic idea is simple: as in all parallel computing environments, you need to find a way to distribute the load across a set of worker nodes.<br />
<br />
At this time, the following ideas have been developed:<br />
<ul class="mycode_list"><li>Split the dictionary into N pieces, distribute the pieces to worker nodes<br />
</li>
<li>Split the rules into N pieces, distribute the pieces to worker nodes<br />
</li>
<li>Split the mask into N pieces, distribute the pieces to worker nodes<br />
</li>
<li>Create offsets in .restore files and distribute the restore files to worker nodes<br />
</li>
</ul>
They all work, but they are all more or less suboptimal. But that's just because oclHashcat was lacking a specific feature that developers need to make it easier, faster, and overall better.<br />
<br />
What we added are just two parameters: -s and -l. If you are at all familar with hashcat, then you already know of these parameters, as hashcat CPU, maskprocessor and statsprocessor have had them for quite a while. They are very simple to use, and they are all you need to integrate oclHashcat into your favourite distributing system like <span style="text-decoration: underline;" class="mycode_u">boinc</span>, or your own solution.<br />
<br />
The -s and -l parameters stand for "skip" and "limit", and allow you to define a range to search within your keyspace. Parameter -s allows you to set the offset, and parameter -l allows you to set the range length. Simply divide the keyspace by the number of nodes to find the range length, and increment the offset by the range length for each node.<br />
<br />
Here's an example: say you have a 1000-word dictionary and four identical worker nodes. So we divide the keyspace of 1000 by 4 nodes, and we get a range of 250. Your command line on each worker node will be as follows:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>PC1: ./oclHashcat64.bin -s&nbsp;&nbsp; 0 -l 250 ...&nbsp;&nbsp; // computes&nbsp;&nbsp; 0 - 249<br />
PC2: ./oclHashcat64.bin -s 250 -l 250 ...&nbsp;&nbsp; // computes 250 - 499<br />
PC3: ./oclHashcat64.bin -s 500 -l 250 ...&nbsp;&nbsp; // computes 500 - 749<br />
PC4: ./oclHashcat64.bin -s 750 -l 250 ...&nbsp;&nbsp; // computes 750 - 999</code></div></div><br />
Now, the this example only works well when all of the nodes are identical. But sometimes you have a heterogeneous mixture of devices, and not all nodes will be the same speed. Handling failures also complicates things: what do you do if a node suddenly drops off the network? And what about if you want to add a new node while an attack is running?<br />
<br />
To facilitate these scenarios we must take a different approach. We know the total keyspace is 1000, but this time we won't divide it by 4 because we don't know precisely how many nodes we have. Instead, we can simply use a fixed length for all nodes, and rely on the master node to keep track of the -s value. Then we can hand out work items to the nodes with a loop. <br />
<br />
Here's an example of this approach using a fixed range length of 100.<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>long keyspace = 1000<br />
long limit = 100<br />
<br />
for (long skip = 0; skip &lt; keyspace; skip += limit)<br />
{<br />
&nbsp;&nbsp;PCxxxx: ./oclHashcat64.bin -s skip -l limit<br />
}</code></div></div><br />
This is a rudimentary and incomplete example, but it serves to demonstrate that those two parameters are all you need to distribute work, even in more complicated environments.<br />
<br />
Now in the previous examples, calculating the keyspace was simple because we were using a dictionary attack. For dictionary attacks, the keyspace is simply the number of words in the dictionary. But it is a bit more complicated to calculate the keyspace when dealing with more advanced attack modes. Therefore, we have added another parameter called --keyspace that will calculate the keyspace for any given attack. When using a mask attack, for example, you should use --keyspace instead of trying to calculate the keyspace yourself.<br />
<br />
Here's an example of how to use the --keyspace parameter:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d?d?d?d --keyspace<br />
1000000<br />
atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d?d?d --keyspace<br />
100000<br />
atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d?d --keyspace<br />
10000<br />
atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d --keyspace<br />
10000</code></div></div><br />
Take a close look at the last two examples. Please make life easy on yourself by using --keyspace to calculate the keyspace for all of your distributed attacks.<br />
<br />
With all that said, we had hoped that when we started to add more distributed support it would encourage people to build more third-party distributed wrappers for oclHashcat. Already, a few beta testers have started working on such solutions. Here's an example: <a href="http://www.youtube.com/watch?v=0K4mTG5jiR8" target="_blank" rel="noopener" class="mycode_url">http://www.youtube.com/watch?v=0K4mTG5jiR8</a><br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added outfiles directory</span><br />
<hr class="mycode_hr" />
<br />
Soon after beta testers realized that they were now able to distribute the workload, they came up with another problem: What about the <span style="text-decoration: underline;" class="mycode_u">results</span> of the cracked hashes?<br />
<br />
Usually this doesn't matter if you are running a brute-force attack or running against an unsalted hashlist, but it's different when you have a salted hashlist. If you have a hashlist with 100 salted hashes, the time to process a keyspace is 100 timer longer than with a single salt. That should be clear, right?<br />
<br />
oclHashcat has this optimization, as every good hash cracker should have, where if you crack all hashes bound to a specific salt, it removes that salt from the salt list and is never checked again. But in a distributed environment, there can be a node that cracked a specific salt completly by cracking all the hashes bound to it, but the other nodes do not know about that, and still process that salt unnecessarily.<br />
<br />
We had the same problem a while back with oclHashcat-lite. It already supported -s and -l, and people were writing distributed wrappers around it. They raised the same question: what if one node cracked a hash (oclHashcat-lite was single hash), how do the other nodes know that they should stop working on it?<br />
<br />
This eventually resulted in the following question: How to inform a running oclHashcat session with the information that a hash that it is trying to crack was cracked by a different node.<br />
<br />
After discussing this with beta testers, we came up with a very easy solution: just put the cracked hash into a file in a directory that we call "the outfile directory." oclHashcat periodically scans the outfile directory, and reads all the files within it. For each file, and for each line in the file, it tries to match them against the internal hash table that keeps the information on which hash and which salt is cracked, and which not, and then marks it as cracked.<br />
<br />
It's not required, but for example, to automate that process completly all you need to have is a shared directory like NFS or CIFS in which all your distributed nodes can write. Point all your nodes to write into a file in that shared directory (protip: you should use a unique file for each node.) Once a node cracks a hash, it writes it into its own outfile, and all other nodes are informed about it since they are periodically scanning the same directory.<br />
<br />
There are some additional parameters to configure this behavior:<br />
<ul class="mycode_list"><li>Patemeter "--outfile-check-dir" is the directory to periodically scan. If you do not configure it, it will be set to &#36;session.outfiles by default<br />
</li>
<li>Parameter "--outfile-check-timer" can be used to configure the period in seconds to rescan the outfile directory. The default is set to 5 seconds and you can disable it by setting it to 0.<br />
</li>
</ul>
This solution also automatically stops all nodes if all hashes have been cracked, you can save some energy.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Rewrote restore system from scratch</span><br />
<hr class="mycode_hr" />
<br />
Sometime oclHashcat is a bit pedantic. That was especially true when using --restore. It was so pedantic, I could barely use it myself. For example, restoring was only possible...<br />
<ul class="mycode_list"><li>Only from the same computer. That means: same set of GPU's, same order on the PCI bus, etc. If your hardware broke, you're lost<br />
</li>
<li>Only from the same hashlist. In case you got cracked hashes from external sources there was no way to <span style="text-decoration: underline;" class="mycode_u">inform oclHashcat</span> about it<br />
</li>
<li>Only from the same installation directory. In case you moved the installation directory, it was unable to restore<br />
</li>
</ul>
In theory, none of this would concern you if you were simply restoring after a power failure. But in reality, there are more complex reasons that force you to try to restore a previous session, such as hardware failure.<br />
<br />
What we wanted was a more transparent, flexible, error-resistant and <span style="text-decoration: underline;" class="mycode_u">robust</span> restore. With the new approach, you are no longer limited by the above points. There is, for instance, no more binding to the hardware or the hashlist.<br />
<br />
But this new oclHashcat version is going much further. For example, you can now manually change the restore point. That means if you lost a .restore file for whatever reason, but you remember a position where it was, you can now set it manually. Also the size of the .restore files is now guaranteed to stay at a low filesize (somewhere &lt; 2k).<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Rewrote multihash structure</span><br />
<hr class="mycode_hr" />
<br />
Not long ago, we had announced that it was possible to load up to 25 million hashes at once. Of course, we were talking about unsalted hashes that can be cracked with multihash techniques, not salted ones. That was not bad, but now it's even better! In 1.20, you are now able to load hashlists that contain up to 100 million hashes, and some beta testers have had success loading up to 150 million hashes. For those of you who think this is senseless, here's why we do it: Cracking huge unsalted hashlists is a great way to build new wordlists based on real passwords people use, originating from real hashdumps leaked on the Internet. Check out the compilation that KoreLogic did once, I think it was around 150 million unique MD5 hashes.<br />
<br />
To accomplish this, we had to transition away from the previous technique where we transfered the password candiates used to crack a hash from GPU memory to host memory. Because there is no way to communicate between workgroups with OpenCL (only workitems can communicate), we were required to allocate the total amount of password buffers on the GPU, as we had the number of unique hashes multipled with the size of that password buffer. As you can imagine, that took a lot of GPU memory that could not be used for real hashes. By using a different technique that does not depend on allocating the total amount for the password buffers we can now use this memory for hashes instead.<br />
<br />
Another thing was to speed up the process of cracking huge hashlists, which is a very memory-intensive task, we decided to increase the maximum bitmap size to 24. The bitmaps are what enable us to check for the possible nonexistence of a hash in a hashlist, before going into the costly search function. By increasing the size of the bitmap buffer, the number of unwanted <span style="text-decoration: underline;" class="mycode_u">collisions</span> decreases. This increases the overall efficiency of the bitmap system, which results in an increase of overall performance.<br />
<br />
These huge bitmaps can affect your ability to load huge hashlists, because they require a lot of GPU memory. Therefore you have a new parameter added called --bitmap-max. Usually you will never need it, but in case you want to load a huge hashlist and you get an error message from oclHashcat that it was unable to load it because the memory limit was reached, try to decrease the value of it (for example to 16) and it will save some GPU memory.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added debugging support for rules</span><br />
<hr class="mycode_hr" />
<br />
Most of you are already familiar with the debug parameters from hashcat CPU, and many of you wanted this feature in oclHashcat as well. Previously, it was not possible to implement this feature. However, due to the architecture changes described above, this feature is now possible.<br />
<br />
There's a couple of new parameters to configure this new feature:<br />
<ul class="mycode_list"><li>Parameter --debug-mode is used to configure whatever base-word, rule or cracked password to write<br />
</li>
<li>Parameter --debug-file is used to write the debugging information to a file rather than to stdout<br />
</li>
</ul>
<br />
<br />
This feature is primarily aimed for <span style="text-decoration: underline;" class="mycode_u">generating</span> new rules, but it's also good if you want to find out which of your words in your dictionaries are efficient, or which rules in your rulesets crack the most hashes. But for this example, I'll only focus on the rule generator:<br />
<br />
##<br />
## 1. Crack some hashes with random generated rules with a small wordlist<br />
##<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
atom@ht:~/oclHashcat-1.20&#36; ./oclHashcat64.bin example0.hash example.dict --generate-rules 100 --debug-mode 3 --quiet<br />
cf61d5aed48e2c5d68c5e3d2eab03241:alex999999999<br />
alex99:Z5 Z2<br />
a4bf29620bb32f40c3fc94ad1fc3537a:_hallo12<br />
hallo12:^_<br />
ba114384cc2dbf2f2e3230b803afce86:321654987Q<br />
321654987:&#36;Q<br />
77719e24d4e842c8c87d91e73c7d1a8f:1123581322<br />
1123581321:oAL *98 +8<br />
e2a3f66b3de94593e2e0a6e5208b55af:anais20072007<br />
anais2007:Y4<br />
77108d6b734f4f4e06639fced921b1fe:1234qwerQ<br />
1234qwer:&#36;Q<br />
66dec649460b9ebfdb3f513c2985525c:wrestlingg<br />
wrestling:Z1<br />
8c0d31cadefef386ed4ebb2daf1b80be:newports12<br />
newports21:*98 p4<br />
</span></blockquote>
<br />
##<br />
## 2. Above example is just for display of the use, usually you would do --debug-file which would contain the following information instead:<br />
##<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
atom@ht:~/oclHashcat-1.20&#36; cat debug.rules<br />
alex99:Z5 Z2<br />
hallo12:^_<br />
321654987:&#36;Q<br />
1123581321:oAL *98 +8<br />
anais2007:Y4<br />
1234qwer:&#36;Q<br />
wrestling:Z1<br />
newports21:*98 p4<br />
</span></blockquote>
<br />
##<br />
## 3. Optimize rules with new rule-optimizer:<br />
##<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
atom@ht:~/oclHashcat-1.20&#36; tools/rules_optimize/rules_optimize.bin &lt; debug.rules | sort -u<br />
^_<br />
*98 +8<br />
*98 p4<br />
&#36;Q<br />
Y4<br />
Z1<br />
Z5 Z2<br />
</span></blockquote>
<br />
What this did is removed the "oAL" function since it wasn't neccessary, thus sort -u packing rate will increase. The new rules optimizer is a standalone binary for use with debug-rules mode 3 output files, and can be found in the extra/ directory.<br />
<br />
Over the last few days, I was running oclHashcat with -g parameter in an endless loop, always with around 10k generated rules. In total, I collected around 50k new rules, and each of them cracked at least one new hash. Then, I re-ran those 50k rules on my full dictionaries, and it had a great effect.<br />
<br />
After a few days of letting this run in a loop, the beta testers collected a list of 600k new rules. Can you imagine that, <span style="text-decoration: underline;" class="mycode_u">600k</span> new rules. Each of them actually cracked a previously-uncracked hash. We thought this was really cool, and we wanted to share it. We ran it through the optimizer, and sorted by occurrence to have the best rules on top. We then removed all rules that did not at least crack -two- unique hashes, and the result is a list of 64k new rules sorted by occurrence. That file was name generated2.rule and added to the rules/ directory. Have fun!<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added support for &#36;HEX[]</span><br />
<hr class="mycode_hr" />
<br />
This addition basically goes back to the following trac ticket: <a href="https://hashcat.net/trac/ticket/148" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/148</a><br />
<br />
The problem is with character encodings for various languages. To be completely honest, I really don't like this topic. There are many different encoding types, many languages, and characters. What you need to know when it comes to encoding and hashes is that most, if not all, algorithms do not care about encoding at all. Hashes algorithms just work on bytes. That means if you input a password that contains for example a german umlaut, this can result in multiple different hashes of the same unsalted algorithm. For example there are three different hashes depending if you used ISO-8859-1, utf-8 or utf-16.<br />
<br />
We often have to deal with hashlists of unknown encoding. Therefore, the output encoding (in the shell or in the outfile) might not match with the configured encoding of our shell or our editor. The result is weird characters and user are getting confused. Worst case is if the hashlists contain mixed encodings, because the systems that generated the hashes had different encoding settings. That is something that makes our case unique, and which is why we can not simply output all plaintexts as utf-8.<br />
<br />
Then there is more drama. There are hashes in hashlist compilations that have been put into these hashlist compilations by highly intelligent individuals. That is when they try to put in a hash into a submission mask for a hash of a complete different hash-type. For example the mask of raw MD5 but they have a salted MD5. They simply remove the salt and force in that way the acceptance from the system. Now, in combination, the problem is that some admins simply use \n, \r or even null-bytes as salt. But then, when oclHashcat is configured to automatically generate random rules it can happen that with + or - function we crack those \n salted hashes which leads to a complete different problem.<br />
<br />
The solution is as the trac ticket suggest: if the plaintext password contains at least one character that is outside the 0x20 - 0x80 ASCII range we automatically switch the output format to &#36;HEX[...] completely. That is a bit like utf-8 but we're not just converting the next character, we completely put the word into hex mode. Doing this, we workaround problems with:<br />
<br />
<ul class="mycode_list"><li>The potfile, because the format is very simple. It works line by line and if there is a newline character in the password you password, if verified, would not match against the hash if &#36;HEX[] was not used<br />
</li>
<li>The outfile, because it's not looking like weird characters when the encoding does not match to your configured one. This should help to avoid confuse unexperienced users<br />
</li>
</ul>
However, not everyone likes this feature. We added a parameter "--outfile-autohex-disable" such that oclHashcat output plains as it did with previous hashcat version.<br />
<br />
Also note that we've added support for reading &#36;HEX[...] encoded words from your wordlist. That is when you cracked some password that was then converted to &#36;HEX[...] and you then merge that password with your wordlists you don't have to worry about it. oclHashcat identifies &#36;HEX[...] encoding while reading wordlists and automatically converts them to what the words were originally.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added tweaks for AMD OverDrive 6 and better fan speed control</span><br />
<hr class="mycode_hr" />
<br />
This version of oclHashcat includes several changes to add better support for new AMD GPUs, i.e. OverDrive 6 enabled graphic cards. These new features range from the simple detection of OverDrive 6 GPUs, to better memory clock, core clock, powertune and fanspeed control. Since OverDrive 6 GPUs behave very different to previous AMD GPUs in what regards performance tuning (i.e. the powertune threshold and many other tuning settings need to be set to reach maximum performance), many of you may have used od6config tool by epixoip during the last months for e.g. R9 290x graphics cards. Therefore, we decided that oclHashcat should include some basic tuning support such that e.g. new users don't need to always use od6config before running oclHashcat for those cards.<br />
<br />
Basically, this new version sets core clock, memory clock and the powertune threshold to reasonable values. The changes oclHashcat makes will always be undone after oclHashcat quits, therefore you won't need to bother about all those tuning options and the reset of it later on (because maybe you want to save eletricity). Anyway, we also added a new switch called --powertune-disable. If this switch was set, oclHashcat will skip all OverDrive 6 performance tuning steps. This way you can set this switch if you want to manually set different performance tuning options (e.g. with od6config) beforehand. We added all those powertuning change to make it more convenient for the user and to avoid that users are shocked by the low performance of OverDrive 6 cards if performance options were not manually set.<br />
<br />
While doing all these changes, we discovered some problems with fan speed control and did try to improve this feature a lot. For instance, as mentioned here <a href="https://hashcat.net/trac/ticket/238" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/238</a> with previous versions it could happen that oclHashcat exits without resetting the fan speed to a reasonable value (i.e. either the speed it was before the run or the default value managed by the driver). For multi GPU setups we identified another strange behaviour with previous versions of oclHashcat and fixed it. Sometimes it could have happened that the fan speed showed N/A even if it should show the current fan speed in percentage. The problem for this unexpected behaviour was due to querying the wrong device within oclHashcat (read more about it for instance here: <a href="https://hashcat.net/trac/ticket/231" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/231</a> ). As you can read there, the temperature value was not accurate in some specific situations (multi gpu, windows and not all GPUs set to "active").<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Adding new password candidates on-the-fly</span><br />
<hr class="mycode_hr" />
<br />
The idea to support a way to add new password candidates (e.g. dictionary words) on-the-fly goes back to a different request that wanted a so-called loopback feature. Let me explain first what that loopback feature is.<br />
<br />
The loopback feature makes only sense in straight-mode with rules. Whenever oclHashcat cracks a hash, the matching plain is re-queued to run through the rule-engine. So, when does this make sense?<br />
<br />
Here's an example hashlist:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>7c6a180b36896a0a8c02787eeafb0e4c<br />
1e5c2776cf544e213c3d279c40719643</blockquote>
<br />
... and we have the following wordlist with just a single word:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>password</blockquote>
<br />
... and a simple rule that append a 1 to each word from the wordlist:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&#36;1</blockquote>
<br />
When I run this, it will crack one of the above hashes:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>7c6a180b36896a0a8c02787eeafb0e4c:password1</blockquote>
<br />
Now, with the loopback feature enabled, it will take "password1" as a new candidate and the rule &#36;1 is applied. It will now crack:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>1e5c2776cf544e213c3d279c40719643:password11</blockquote>
<br />
This goes on and on, until there is no new hash cracked and therefore new password re-added to the queue.<br />
<br />
Where is this useful in real life? For example when cracking millions of hashes at once to build you dictionaries. If you run it with many rules chances are good to automatically detect a <span style="text-decoration: underline;" class="mycode_u">pattern</span> in that hashlist.<br />
<br />
Now we can go back to the password candidates on-the-fly. When we thought about how to add that request we came up with the idea of the induction directory. This directory can be defined with the new parameter "--induction-dir" or you skip specifying it and oclHashcat will define it as &#36;session.induct. oclHashcat will create that directory for you automatically (and remove it afterwards). While oclHashcat is running you can put files into that new directory which will be scanned by oclHashcat as soon as the current dictionary finishes.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Rewrote weak-hash check</span><br />
<hr class="mycode_hr" />
<br />
This feature goes back to the following trac ticket: <a href="https://hashcat.net/trac/ticket/165" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/165</a><br />
<br />
Note that our implementation is not exactly as it was requested in the ticket.<br />
<br />
I'll explain: The goal of this feature is to notice if there is a hash whose plaintext is empty, that means a 0-length password. Typically when you just hit enter. We call it a weak-hash check even if it should have been called weak-password check but there are simply too many weak-passwords.<br />
<br />
Previous version did support this, but only for unsalted hashes. That was easy to implement because on unsalted hashes the 0-length password always results in the same hash. By simply checking that hash, it was possible to find out if it's used. Thing is getting more complicated when a salt is involved. That means that we actually have to run the kernel and create a 0-length password result but with exactly that salt. But that wasn't too easy because oclHashcat has different attack-modes and depending on which attack-mode you choose a different kernel is loaded. Therefore the attack parameters change and we have to create different 0-length password attacks for each attack-mode a user can choose. But that's not all. There are also many differences if some special parameters are set for slow hashes and for fast hashes. That were those problems to solve just to get it working, but that's done, no more headache with this.<br />
<br />
The next problem, however, is if your hashlist contains millions of salts. As already explained above, we have to run a kernel for each salt. If you want to check for empty passwords for that many salts you will have a very long initialization/startup time by running oclHashcat. To work around this problem we added a parameter called "--weak-hash-threshold". With it you can set a maximum number of salts for which weak hashes should be checked on start. The default is set to 100, that means if you use a hashlist with 101 unique salts it will not try to do a weak-hash check at all. Note we are talking about unique salts not unique hashes. Cracking unsalted hashes results in 1 unique salt (an empty one). That means if you set it to 0 you are disabling it completely, also for the unsalted hashes.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Reload previously-cracked hashes from potfile</span><br />
<hr class="mycode_hr" />
<br />
With this feature added, oclHashcat will read the potfile every time oclHashcat starts and compares the content of the .pot file (the cracked hashes) with the hashes from the hashlist it is trying to crack. This is something that is present in JtR, and JtR users will alredy know how this works, but we've added it for a different reason.<br />
<br />
When we rewrote the restore feature, we had that problem that, in case of a restore, oclHashcat did not know which hash were already cracked in the previous run. Unless you use --remove, which automatically removes all cracked hashes from your hashlist in real-time, it would start cracking the same hashes again, depending on your attack-type.<br />
<br />
There's just one solution: you need to keep track of the hashes that have been cracked already, and compare it on every start with the hashlist. This is typically a very fast process, but if you have a lot of entries in your potfile, it can take some time. However, it is save to remove the potfile if you don't need it any longer. The potfile name is &#36;session.potfile. If you dont want to remove the potfile you can also skip the loading delay by disabling the use of this new feature with the "--potfile-disable" flag completetly. But note, this also disables the writing of it. If you crack a hash it will create confusion if you want to restore a session. Make sure you know what you do.<br />
<br />
The way this feature compares and finds hashes is basically the same as when reading files from the outfile directories.<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Full Changeset</span><br />
<hr class="mycode_hr" />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD Catalyst v14.4 (mantle) driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD new GPUs: "Spectre", "Spooky", "Kalindi", "Hainan", "Iceland", "Tonga" and "Mullins"<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 331.67 driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV new GPUs: "sm_50" (Maxwell)<br />
<br />
Type: Reimplementation<br />
File: Kernel<br />
Desc: Rewrote multihash structure, ex: 290x can now load up to 100,000,000+ MD5/NTLM hashes at once<br />
<br />
Type: Reimplementation<br />
File: Kernel and Host<br />
Desc: Rewrote rule engines (CPU and GPU) and made them more robust by synchronizing error handling<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote restore system from scratch; no longer requires same system with same GPUs<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Restructured .restore file; no longer create huge .restore files, stay &lt; 2k of size<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote weak-hash check; support all algorithm types including salted ones<br />
Trac: #165<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote workload dispatching when progress is near to keyspace end; act more conservative<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote mechanism to control the fan with AMD GPUs<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 22 = Juniper Netscreen/SSG (ScreenOS)<br />
Trac: #235<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 200 = MySQL323<br />
Trac: #377<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 1421 = hMailServer<br />
Trac: #401<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 2410 = Cisco-ASA MD5<br />
Trac: #365<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4400 = md5(sha1(&#36;pass))<br />
Trac: #198<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4500 = Double SHA1<br />
Trac: #390<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4700 = sha1(md5(&#36;pass))<br />
Trac: #198<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4800 = MD5(Chap), iSCSI CHAP authentication<br />
Trac: #214<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6251 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES + hidden-volume<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6261 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512 + AES + hidden-volume<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6271 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + AES + hidden-volume<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6281 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES + hidden-volume + boot-mode<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7300 = IPMI2 RAKP HMAC-SHA1<br />
Trac: #233<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7600 = Redmine Project Management Web App<br />
Trac: #391<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7700 = SAP CODVN B (BCODE)<br />
Trac: #177<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7800 = SAP CODVN F/G (PASSCODE)<br />
Trac: #177<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7900 = Drupal7<br />
Trac: #326<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8000 = Sybase ASE<br />
Trac: #193<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8100 = Citrix Netscaler<br />
Trac: #369<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8200 = 1Password, cloudkeychain<br />
Trac: #126<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8300 = DNSSEC (NSEC3)<br />
Trac: #387<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8400 = WBB3, Woltlab Burning Board 3<br />
Trac: #181<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8500 = RACF<br />
Trac: #192<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for &#36;2y&#36; and &#36;2a&#36; bcrypt signatures<br />
Trac: #251<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for higher cost factors for -m 400 = phpass<br />
Trac: #280<br />
<br />
Type: Feature<br />
File: Kernels<br />
Desc: Increased support for username length up to 20 for -m 1100 = Domain Cached Credentials, mscash<br />
Trac: #379<br />
<br />
Type: Feature<br />
File: Kernels<br />
Desc: Increased support for username length up to 20 for -m 2100 = Domain Cached Credentials2, mscash2<br />
Trac: #379<br />
<br />
Type: Feature<br />
File: Kernels<br />
Desc: Added support for mixed cracking WPA and WPA2 at once, no more need for split<br />
Trac: #388<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for Tesla Deployment Kit v5.319.85<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --workload-profile to give the user a convenient way to set the reduced, default or tuned performance tuning options<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter -s for use in distributed computing, mark skip of range of keyspace<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter -l for use in distributed computing, mark length of range of keyspace<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --keyspace for use in distributed computing, calculate keyspace<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Load already cracked hashes from potfile on startup to avoid double cracking<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added inline induction directory that can be used for on-the-fly adding of new password candidates<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --loopback to automatically write cracked plains into a file in the induction directory<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added debugging support for rules as in hashcat CPU; used for rule- and dictionary efficiency analysis<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --debug-mode and --debug-file to write found plains and/or rules as in hashcat CPU<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --debug-mode 4 == original_plain:rule:modified_plain<br />
Trac: #317<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added tweaks for AMD OverDrive 6 (powercontrol, core- and mem-clock profiles)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --powertune-disable to allow users to disable automatic power tuning for AMD OverDrive 6<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --induction-dir to allow the users to specify the folder which will be used instead of the default induct folder<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --outfile-check-dir to allow the users to specify the folder which should be monitored for cracked hashes<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --outfile-check-timer to allow the users to control the outfile/potfile reading frequency (0 = disabled)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added periodic outfile reading such that user can remove hashes while cracking by appending the hash[<img src="https://hashcat.net/forum/images/smilies/confused.gif" alt="Confused" title="Confused" class="smilie smilie_13" />alt]:plain to the file<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for automatic detection for hashfile-formats like pwdump, passwd, shadow, etc. <br />
Trac: #393<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Undo fan speed changes by oclHashcat after stopping/aborting<br />
Trac: #238<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support loading &#36;HEX[...] format from dictionaries<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --outfile-autohex-disable to disable &#36;HEX[...] format<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --hex-wordlist to enable parsing words in wordlists given in hex<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Increased maximum bitmap size to 24 bits to speed up cracking of huge hashlists at once<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --bitmap-max to help loading huge hashlists and with small gpu ram<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --weak-hash-threshold to set a maximum number of salts for which weak hashes should be checked<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --remove-timer to set the frequency the hash-file should be updated when using --remove<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added bit for parameter --outfile-format to print the position of a candidate that cracked a hash<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --status-automat to let oclHashcat display the status view in a machine readable format<br />
Trac: #406<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added column "Skipped" to status display to showing skipped candidates because of cracked salt(s)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Improved handling of signals and terminate events; SIGTERM support and windows cmd close handling<br />
Trac: #143<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added ability to use restore files from previous versions in case the structure did not change<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Set default retain and abort temperatures for AMD OverDrive6 GPUs according to the values reported by ADL<br />
Trac: #225<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter -v to displays the version string (as -V does)<br />
Trac: #252<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support to load and save invalid salt characters used in descrypt<br />
Trac: #269, #405<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for variable iteration number for -m 2100 = mscash2<br />
Trac: #380<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: outfile-check and potfile remove (at startup) can now also be used together with hash mode 2500 = WPA/WPA2 and 6800 = Lastpass<br />
Trac: #400<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added rules_optimizer standalone binary for use with debug-rules mode 3 output files<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: While parsing hashes on start inform user about the progress<br />
<br />
Type: Feature<br />
File: Rules<br />
Desc: Added InsidePro-HashManager.rule<br />
<br />
Type: Feature<br />
File: Rules<br />
Desc: Added generated2.rule, each one cracked a real hash, sorted by occourance. use head -XXXX to make a top XXXX<br />
Cred: EvilMog<br />
<br />
Type: Change<br />
File: Rules<br />
Desc: Renamed passwordspro.rule to InsidePro-PasswordsPro.rule<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Modified output plains to &#36;HEX[...] format in case cracked password contains chars outside 0x20 - 0x80 ASCII range<br />
Trac: #148<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Modified switch --potfile-disable to disable loading already cracked hashes from potfile on startup<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Save potfile and dicstat in the current working directory instead of installation directory<br />
Trac: #281<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Change input hash format for -m 2100 = mscash2<br />
Trac: #380<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Update tab completion for bash (in extra folder) to match up with new parameters<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed switch --disable-potfile to --potfile-disable to match up parameter logic<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed switch --disable-restore to --restore-disable to match up parameter logic<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Help and docs update to underline that OSX 10.9 uses same format as 10.8<br />
Trac: #236<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Help and docs update to underline that MSSQL(2014) uses same format as MSSQL(2012)<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Removed examples.txt; see wiki for more information<br />
Trac: #236<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed hash type Joomla into 'Joomla &lt; 2.5.18', -m 400 has now also the note about MD5(Joomla)<br />
Trac: #402<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: Raw whirlpool -m 6100 hashes could not be cracked in -a 1 combinator mode<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: If increment and masks were used in combination, status display needs reset to INIT after each iteration<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: In attack-mode 1 and 7, if at least one word in right wordlist is exactly of length 31, memory corruption occoured over time<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Status timer should be enabled by default when in stdin mode<br />
Trac: #218<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Improved reading of fan speed and temperature; It sometimes failed when using twin GPUs on windows<br />
Trac: #231<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: File handling ('Permission denied' error) fixed when using --remove with -m 2500<br />
Trac: #395<br />
<br />
Type: Distribution<br />
File: Packages<br />
Desc: Created two packages for download: oclHashcat-* for AMD, cudaHashcat-* for CUDA<br />
</span></blockquote>
<br />
One last thing: With this update you'll be able to load pwdump, passwd and shadow unmodified. If you want other native formats added, please update this ticket: <a href="https://hashcat.net/trac/ticket/393" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/393</a><br />
<br />
--<br />
atom]]></description>
			<content:encoded><![CDATA[Download here: <a href="https://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/oclhashcat/</a><br />
<br />
ACHTUNG! <br />
<br />
You will need to take some time to go through all of the release notes, as there are megatons of new features. Don't worry, it's mostly just additions, so you won't have to relearn oclHashcat's syntax all over again. However, many of the new feature require an explanation. You should know what they do, how they work, and how you can use them -- or at least, how we think you can use them.<br />
<br />
Our goal whenever we're adding these types of features is to nurture your creativity. You are not forced to use these features in exactly the same way we suggest. Actually, we hope that some of the new features enable your neurons to fire, and inspire you with new ideas of how you can design more efficient attacks, or simply to help make the task more comfortable.<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added algorithms</span><br />
<hr class="mycode_hr" />
<br />
Here's a quick overview about the newly-added hash types:<br />
<ul class="mycode_list"><li>Juniper Netscreen/SSG (ScreenOS)<br />
</li>
<li>MySQL323<br />
</li>
<li>MD5(SHA1())<br />
</li>
<li>Double SHA1<br />
</li>
<li>SHA1(MD5())<br />
</li>
<li>Cisco-ASA MD5<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES + hidden-volume<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-SHA512 + AES + hidden-volume<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-Whirlpool + AES + hidden-volume<br />
</li>
<li>TrueCrypt 5.0+ PBKDF2 HMAC-RipeMD160 + AES + hidden-volume + boot-mode<br />
</li>
<li>IPMI2 RAKP HMAC-SHA1<br />
</li>
<li>Redmine<br />
</li>
<li>SAP CODVN B (BCODE)<br />
</li>
<li>SAP CODVN F/G (PASSCODE)<br />
</li>
<li>Drupal7<br />
</li>
<li>Sybase ASE<br />
</li>
<li>Citrix Netscaler<br />
</li>
<li>1Password, cloudkeychain<br />
</li>
<li>DNSSEC (NSEC3)<br />
</li>
<li>WBB3, Woltlab Burning Board 3<br />
</li>
<li>RACF<br />
</li>
</ul>
You should take a close look at the SAP-B (BCODE) algorithm. AFAIK this hash is still in use in many enterprise installations. This algorithm is clearly <span style="text-decoration: underline;" class="mycode_u">broken</span>! This is serious.<br />
<br />
Also see Frank Dittrich's original writeup about the algorithm at <a href="http://www.revision-online.info/index.php/Datei:SAP_Passwort_Update.pdf" target="_blank" rel="noopener" class="mycode_url">http://www.revision-online.info/index.ph...Update.pdf</a><br />
It does a decent job of explaining the weaknesses, but it was written in a time where there was no GPGPU-based cracking. Or at least, not for this algorithm.<br />
<br />
SAP-B passwords are limited to a keyspace of 69^8. With oclHashcat v1.20, a single R9 290x can crack a hash of this type with a rate of 850 MH/s (the hd7970 is at 560 MH/s). Therefore, 8 x R9 290x can crack -every- possible SAP-B password in max. 20 hours.<br />
<br />
The worst part about it is that the reduced keyspace is not just a matter of uppercasing the password like LM does, but it further replaces all characters outside the 0x20-0x80 ASCII range with 0xff. In other words, even if you use crazy keycodes in your password, it will be cracked in max. 20 hours. It's hopeless.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">AMD Catalyst v14.x (Mantle) driver</span><br />
<hr class="mycode_hr" />
<br />
The Mantle drivers have created some initial headaches for us. The main problem is that OpenCL binary kernels compiled for previous stable 13.x Catalyst drivers are incompatible with binary kernels compiled for Mantle drivers. So, it's not our fault that you are forced to update to Catalyst 14.x. More annoyingly, the 14.x drivers are also required if you are running Linux kernel 3.13+, so we really don't have a choice, do we?<br />
<br />
There is an upside to upgrading to the Mantle drives, though. The OpenCL JIT compiler was updated to produce more optimized low-level instructions for the GPU, which we as developeres have no access to when using OpenCL. This means that the JIT compiler is finally starting to become as optimized as our OpenCL kernels, which translates into a 23% performance gain for NTLM.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Improved distributed cracking support</span><br />
<hr class="mycode_hr" />
<br />
There have been a lot of different third-party approaches to distributed cracking with oclHashcat. The basic idea is simple: as in all parallel computing environments, you need to find a way to distribute the load across a set of worker nodes.<br />
<br />
At this time, the following ideas have been developed:<br />
<ul class="mycode_list"><li>Split the dictionary into N pieces, distribute the pieces to worker nodes<br />
</li>
<li>Split the rules into N pieces, distribute the pieces to worker nodes<br />
</li>
<li>Split the mask into N pieces, distribute the pieces to worker nodes<br />
</li>
<li>Create offsets in .restore files and distribute the restore files to worker nodes<br />
</li>
</ul>
They all work, but they are all more or less suboptimal. But that's just because oclHashcat was lacking a specific feature that developers need to make it easier, faster, and overall better.<br />
<br />
What we added are just two parameters: -s and -l. If you are at all familar with hashcat, then you already know of these parameters, as hashcat CPU, maskprocessor and statsprocessor have had them for quite a while. They are very simple to use, and they are all you need to integrate oclHashcat into your favourite distributing system like <span style="text-decoration: underline;" class="mycode_u">boinc</span>, or your own solution.<br />
<br />
The -s and -l parameters stand for "skip" and "limit", and allow you to define a range to search within your keyspace. Parameter -s allows you to set the offset, and parameter -l allows you to set the range length. Simply divide the keyspace by the number of nodes to find the range length, and increment the offset by the range length for each node.<br />
<br />
Here's an example: say you have a 1000-word dictionary and four identical worker nodes. So we divide the keyspace of 1000 by 4 nodes, and we get a range of 250. Your command line on each worker node will be as follows:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>PC1: ./oclHashcat64.bin -s&nbsp;&nbsp; 0 -l 250 ...&nbsp;&nbsp; // computes&nbsp;&nbsp; 0 - 249<br />
PC2: ./oclHashcat64.bin -s 250 -l 250 ...&nbsp;&nbsp; // computes 250 - 499<br />
PC3: ./oclHashcat64.bin -s 500 -l 250 ...&nbsp;&nbsp; // computes 500 - 749<br />
PC4: ./oclHashcat64.bin -s 750 -l 250 ...&nbsp;&nbsp; // computes 750 - 999</code></div></div><br />
Now, the this example only works well when all of the nodes are identical. But sometimes you have a heterogeneous mixture of devices, and not all nodes will be the same speed. Handling failures also complicates things: what do you do if a node suddenly drops off the network? And what about if you want to add a new node while an attack is running?<br />
<br />
To facilitate these scenarios we must take a different approach. We know the total keyspace is 1000, but this time we won't divide it by 4 because we don't know precisely how many nodes we have. Instead, we can simply use a fixed length for all nodes, and rely on the master node to keep track of the -s value. Then we can hand out work items to the nodes with a loop. <br />
<br />
Here's an example of this approach using a fixed range length of 100.<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>long keyspace = 1000<br />
long limit = 100<br />
<br />
for (long skip = 0; skip &lt; keyspace; skip += limit)<br />
{<br />
&nbsp;&nbsp;PCxxxx: ./oclHashcat64.bin -s skip -l limit<br />
}</code></div></div><br />
This is a rudimentary and incomplete example, but it serves to demonstrate that those two parameters are all you need to distribute work, even in more complicated environments.<br />
<br />
Now in the previous examples, calculating the keyspace was simple because we were using a dictionary attack. For dictionary attacks, the keyspace is simply the number of words in the dictionary. But it is a bit more complicated to calculate the keyspace when dealing with more advanced attack modes. Therefore, we have added another parameter called --keyspace that will calculate the keyspace for any given attack. When using a mask attack, for example, you should use --keyspace instead of trying to calculate the keyspace yourself.<br />
<br />
Here's an example of how to use the --keyspace parameter:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d?d?d?d --keyspace<br />
1000000<br />
atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d?d?d --keyspace<br />
100000<br />
atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d?d --keyspace<br />
10000<br />
atom@sf:~/oclHashcat-1.20&#36; ./oclHashcat64.bin some.hash -a 3 ?d?d?d?d?d?d --keyspace<br />
10000</code></div></div><br />
Take a close look at the last two examples. Please make life easy on yourself by using --keyspace to calculate the keyspace for all of your distributed attacks.<br />
<br />
With all that said, we had hoped that when we started to add more distributed support it would encourage people to build more third-party distributed wrappers for oclHashcat. Already, a few beta testers have started working on such solutions. Here's an example: <a href="http://www.youtube.com/watch?v=0K4mTG5jiR8" target="_blank" rel="noopener" class="mycode_url">http://www.youtube.com/watch?v=0K4mTG5jiR8</a><br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added outfiles directory</span><br />
<hr class="mycode_hr" />
<br />
Soon after beta testers realized that they were now able to distribute the workload, they came up with another problem: What about the <span style="text-decoration: underline;" class="mycode_u">results</span> of the cracked hashes?<br />
<br />
Usually this doesn't matter if you are running a brute-force attack or running against an unsalted hashlist, but it's different when you have a salted hashlist. If you have a hashlist with 100 salted hashes, the time to process a keyspace is 100 timer longer than with a single salt. That should be clear, right?<br />
<br />
oclHashcat has this optimization, as every good hash cracker should have, where if you crack all hashes bound to a specific salt, it removes that salt from the salt list and is never checked again. But in a distributed environment, there can be a node that cracked a specific salt completly by cracking all the hashes bound to it, but the other nodes do not know about that, and still process that salt unnecessarily.<br />
<br />
We had the same problem a while back with oclHashcat-lite. It already supported -s and -l, and people were writing distributed wrappers around it. They raised the same question: what if one node cracked a hash (oclHashcat-lite was single hash), how do the other nodes know that they should stop working on it?<br />
<br />
This eventually resulted in the following question: How to inform a running oclHashcat session with the information that a hash that it is trying to crack was cracked by a different node.<br />
<br />
After discussing this with beta testers, we came up with a very easy solution: just put the cracked hash into a file in a directory that we call "the outfile directory." oclHashcat periodically scans the outfile directory, and reads all the files within it. For each file, and for each line in the file, it tries to match them against the internal hash table that keeps the information on which hash and which salt is cracked, and which not, and then marks it as cracked.<br />
<br />
It's not required, but for example, to automate that process completly all you need to have is a shared directory like NFS or CIFS in which all your distributed nodes can write. Point all your nodes to write into a file in that shared directory (protip: you should use a unique file for each node.) Once a node cracks a hash, it writes it into its own outfile, and all other nodes are informed about it since they are periodically scanning the same directory.<br />
<br />
There are some additional parameters to configure this behavior:<br />
<ul class="mycode_list"><li>Patemeter "--outfile-check-dir" is the directory to periodically scan. If you do not configure it, it will be set to &#36;session.outfiles by default<br />
</li>
<li>Parameter "--outfile-check-timer" can be used to configure the period in seconds to rescan the outfile directory. The default is set to 5 seconds and you can disable it by setting it to 0.<br />
</li>
</ul>
This solution also automatically stops all nodes if all hashes have been cracked, you can save some energy.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Rewrote restore system from scratch</span><br />
<hr class="mycode_hr" />
<br />
Sometime oclHashcat is a bit pedantic. That was especially true when using --restore. It was so pedantic, I could barely use it myself. For example, restoring was only possible...<br />
<ul class="mycode_list"><li>Only from the same computer. That means: same set of GPU's, same order on the PCI bus, etc. If your hardware broke, you're lost<br />
</li>
<li>Only from the same hashlist. In case you got cracked hashes from external sources there was no way to <span style="text-decoration: underline;" class="mycode_u">inform oclHashcat</span> about it<br />
</li>
<li>Only from the same installation directory. In case you moved the installation directory, it was unable to restore<br />
</li>
</ul>
In theory, none of this would concern you if you were simply restoring after a power failure. But in reality, there are more complex reasons that force you to try to restore a previous session, such as hardware failure.<br />
<br />
What we wanted was a more transparent, flexible, error-resistant and <span style="text-decoration: underline;" class="mycode_u">robust</span> restore. With the new approach, you are no longer limited by the above points. There is, for instance, no more binding to the hardware or the hashlist.<br />
<br />
But this new oclHashcat version is going much further. For example, you can now manually change the restore point. That means if you lost a .restore file for whatever reason, but you remember a position where it was, you can now set it manually. Also the size of the .restore files is now guaranteed to stay at a low filesize (somewhere &lt; 2k).<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Rewrote multihash structure</span><br />
<hr class="mycode_hr" />
<br />
Not long ago, we had announced that it was possible to load up to 25 million hashes at once. Of course, we were talking about unsalted hashes that can be cracked with multihash techniques, not salted ones. That was not bad, but now it's even better! In 1.20, you are now able to load hashlists that contain up to 100 million hashes, and some beta testers have had success loading up to 150 million hashes. For those of you who think this is senseless, here's why we do it: Cracking huge unsalted hashlists is a great way to build new wordlists based on real passwords people use, originating from real hashdumps leaked on the Internet. Check out the compilation that KoreLogic did once, I think it was around 150 million unique MD5 hashes.<br />
<br />
To accomplish this, we had to transition away from the previous technique where we transfered the password candiates used to crack a hash from GPU memory to host memory. Because there is no way to communicate between workgroups with OpenCL (only workitems can communicate), we were required to allocate the total amount of password buffers on the GPU, as we had the number of unique hashes multipled with the size of that password buffer. As you can imagine, that took a lot of GPU memory that could not be used for real hashes. By using a different technique that does not depend on allocating the total amount for the password buffers we can now use this memory for hashes instead.<br />
<br />
Another thing was to speed up the process of cracking huge hashlists, which is a very memory-intensive task, we decided to increase the maximum bitmap size to 24. The bitmaps are what enable us to check for the possible nonexistence of a hash in a hashlist, before going into the costly search function. By increasing the size of the bitmap buffer, the number of unwanted <span style="text-decoration: underline;" class="mycode_u">collisions</span> decreases. This increases the overall efficiency of the bitmap system, which results in an increase of overall performance.<br />
<br />
These huge bitmaps can affect your ability to load huge hashlists, because they require a lot of GPU memory. Therefore you have a new parameter added called --bitmap-max. Usually you will never need it, but in case you want to load a huge hashlist and you get an error message from oclHashcat that it was unable to load it because the memory limit was reached, try to decrease the value of it (for example to 16) and it will save some GPU memory.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added debugging support for rules</span><br />
<hr class="mycode_hr" />
<br />
Most of you are already familiar with the debug parameters from hashcat CPU, and many of you wanted this feature in oclHashcat as well. Previously, it was not possible to implement this feature. However, due to the architecture changes described above, this feature is now possible.<br />
<br />
There's a couple of new parameters to configure this new feature:<br />
<ul class="mycode_list"><li>Parameter --debug-mode is used to configure whatever base-word, rule or cracked password to write<br />
</li>
<li>Parameter --debug-file is used to write the debugging information to a file rather than to stdout<br />
</li>
</ul>
<br />
<br />
This feature is primarily aimed for <span style="text-decoration: underline;" class="mycode_u">generating</span> new rules, but it's also good if you want to find out which of your words in your dictionaries are efficient, or which rules in your rulesets crack the most hashes. But for this example, I'll only focus on the rule generator:<br />
<br />
##<br />
## 1. Crack some hashes with random generated rules with a small wordlist<br />
##<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
atom@ht:~/oclHashcat-1.20&#36; ./oclHashcat64.bin example0.hash example.dict --generate-rules 100 --debug-mode 3 --quiet<br />
cf61d5aed48e2c5d68c5e3d2eab03241:alex999999999<br />
alex99:Z5 Z2<br />
a4bf29620bb32f40c3fc94ad1fc3537a:_hallo12<br />
hallo12:^_<br />
ba114384cc2dbf2f2e3230b803afce86:321654987Q<br />
321654987:&#36;Q<br />
77719e24d4e842c8c87d91e73c7d1a8f:1123581322<br />
1123581321:oAL *98 +8<br />
e2a3f66b3de94593e2e0a6e5208b55af:anais20072007<br />
anais2007:Y4<br />
77108d6b734f4f4e06639fced921b1fe:1234qwerQ<br />
1234qwer:&#36;Q<br />
66dec649460b9ebfdb3f513c2985525c:wrestlingg<br />
wrestling:Z1<br />
8c0d31cadefef386ed4ebb2daf1b80be:newports12<br />
newports21:*98 p4<br />
</span></blockquote>
<br />
##<br />
## 2. Above example is just for display of the use, usually you would do --debug-file which would contain the following information instead:<br />
##<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
atom@ht:~/oclHashcat-1.20&#36; cat debug.rules<br />
alex99:Z5 Z2<br />
hallo12:^_<br />
321654987:&#36;Q<br />
1123581321:oAL *98 +8<br />
anais2007:Y4<br />
1234qwer:&#36;Q<br />
wrestling:Z1<br />
newports21:*98 p4<br />
</span></blockquote>
<br />
##<br />
## 3. Optimize rules with new rule-optimizer:<br />
##<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
atom@ht:~/oclHashcat-1.20&#36; tools/rules_optimize/rules_optimize.bin &lt; debug.rules | sort -u<br />
^_<br />
*98 +8<br />
*98 p4<br />
&#36;Q<br />
Y4<br />
Z1<br />
Z5 Z2<br />
</span></blockquote>
<br />
What this did is removed the "oAL" function since it wasn't neccessary, thus sort -u packing rate will increase. The new rules optimizer is a standalone binary for use with debug-rules mode 3 output files, and can be found in the extra/ directory.<br />
<br />
Over the last few days, I was running oclHashcat with -g parameter in an endless loop, always with around 10k generated rules. In total, I collected around 50k new rules, and each of them cracked at least one new hash. Then, I re-ran those 50k rules on my full dictionaries, and it had a great effect.<br />
<br />
After a few days of letting this run in a loop, the beta testers collected a list of 600k new rules. Can you imagine that, <span style="text-decoration: underline;" class="mycode_u">600k</span> new rules. Each of them actually cracked a previously-uncracked hash. We thought this was really cool, and we wanted to share it. We ran it through the optimizer, and sorted by occurrence to have the best rules on top. We then removed all rules that did not at least crack -two- unique hashes, and the result is a list of 64k new rules sorted by occurrence. That file was name generated2.rule and added to the rules/ directory. Have fun!<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added support for &#36;HEX[]</span><br />
<hr class="mycode_hr" />
<br />
This addition basically goes back to the following trac ticket: <a href="https://hashcat.net/trac/ticket/148" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/148</a><br />
<br />
The problem is with character encodings for various languages. To be completely honest, I really don't like this topic. There are many different encoding types, many languages, and characters. What you need to know when it comes to encoding and hashes is that most, if not all, algorithms do not care about encoding at all. Hashes algorithms just work on bytes. That means if you input a password that contains for example a german umlaut, this can result in multiple different hashes of the same unsalted algorithm. For example there are three different hashes depending if you used ISO-8859-1, utf-8 or utf-16.<br />
<br />
We often have to deal with hashlists of unknown encoding. Therefore, the output encoding (in the shell or in the outfile) might not match with the configured encoding of our shell or our editor. The result is weird characters and user are getting confused. Worst case is if the hashlists contain mixed encodings, because the systems that generated the hashes had different encoding settings. That is something that makes our case unique, and which is why we can not simply output all plaintexts as utf-8.<br />
<br />
Then there is more drama. There are hashes in hashlist compilations that have been put into these hashlist compilations by highly intelligent individuals. That is when they try to put in a hash into a submission mask for a hash of a complete different hash-type. For example the mask of raw MD5 but they have a salted MD5. They simply remove the salt and force in that way the acceptance from the system. Now, in combination, the problem is that some admins simply use \n, \r or even null-bytes as salt. But then, when oclHashcat is configured to automatically generate random rules it can happen that with + or - function we crack those \n salted hashes which leads to a complete different problem.<br />
<br />
The solution is as the trac ticket suggest: if the plaintext password contains at least one character that is outside the 0x20 - 0x80 ASCII range we automatically switch the output format to &#36;HEX[...] completely. That is a bit like utf-8 but we're not just converting the next character, we completely put the word into hex mode. Doing this, we workaround problems with:<br />
<br />
<ul class="mycode_list"><li>The potfile, because the format is very simple. It works line by line and if there is a newline character in the password you password, if verified, would not match against the hash if &#36;HEX[] was not used<br />
</li>
<li>The outfile, because it's not looking like weird characters when the encoding does not match to your configured one. This should help to avoid confuse unexperienced users<br />
</li>
</ul>
However, not everyone likes this feature. We added a parameter "--outfile-autohex-disable" such that oclHashcat output plains as it did with previous hashcat version.<br />
<br />
Also note that we've added support for reading &#36;HEX[...] encoded words from your wordlist. That is when you cracked some password that was then converted to &#36;HEX[...] and you then merge that password with your wordlists you don't have to worry about it. oclHashcat identifies &#36;HEX[...] encoding while reading wordlists and automatically converts them to what the words were originally.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Added tweaks for AMD OverDrive 6 and better fan speed control</span><br />
<hr class="mycode_hr" />
<br />
This version of oclHashcat includes several changes to add better support for new AMD GPUs, i.e. OverDrive 6 enabled graphic cards. These new features range from the simple detection of OverDrive 6 GPUs, to better memory clock, core clock, powertune and fanspeed control. Since OverDrive 6 GPUs behave very different to previous AMD GPUs in what regards performance tuning (i.e. the powertune threshold and many other tuning settings need to be set to reach maximum performance), many of you may have used od6config tool by epixoip during the last months for e.g. R9 290x graphics cards. Therefore, we decided that oclHashcat should include some basic tuning support such that e.g. new users don't need to always use od6config before running oclHashcat for those cards.<br />
<br />
Basically, this new version sets core clock, memory clock and the powertune threshold to reasonable values. The changes oclHashcat makes will always be undone after oclHashcat quits, therefore you won't need to bother about all those tuning options and the reset of it later on (because maybe you want to save eletricity). Anyway, we also added a new switch called --powertune-disable. If this switch was set, oclHashcat will skip all OverDrive 6 performance tuning steps. This way you can set this switch if you want to manually set different performance tuning options (e.g. with od6config) beforehand. We added all those powertuning change to make it more convenient for the user and to avoid that users are shocked by the low performance of OverDrive 6 cards if performance options were not manually set.<br />
<br />
While doing all these changes, we discovered some problems with fan speed control and did try to improve this feature a lot. For instance, as mentioned here <a href="https://hashcat.net/trac/ticket/238" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/238</a> with previous versions it could happen that oclHashcat exits without resetting the fan speed to a reasonable value (i.e. either the speed it was before the run or the default value managed by the driver). For multi GPU setups we identified another strange behaviour with previous versions of oclHashcat and fixed it. Sometimes it could have happened that the fan speed showed N/A even if it should show the current fan speed in percentage. The problem for this unexpected behaviour was due to querying the wrong device within oclHashcat (read more about it for instance here: <a href="https://hashcat.net/trac/ticket/231" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/231</a> ). As you can read there, the temperature value was not accurate in some specific situations (multi gpu, windows and not all GPUs set to "active").<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Adding new password candidates on-the-fly</span><br />
<hr class="mycode_hr" />
<br />
The idea to support a way to add new password candidates (e.g. dictionary words) on-the-fly goes back to a different request that wanted a so-called loopback feature. Let me explain first what that loopback feature is.<br />
<br />
The loopback feature makes only sense in straight-mode with rules. Whenever oclHashcat cracks a hash, the matching plain is re-queued to run through the rule-engine. So, when does this make sense?<br />
<br />
Here's an example hashlist:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>7c6a180b36896a0a8c02787eeafb0e4c<br />
1e5c2776cf544e213c3d279c40719643</blockquote>
<br />
... and we have the following wordlist with just a single word:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>password</blockquote>
<br />
... and a simple rule that append a 1 to each word from the wordlist:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&#36;1</blockquote>
<br />
When I run this, it will crack one of the above hashes:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>7c6a180b36896a0a8c02787eeafb0e4c:password1</blockquote>
<br />
Now, with the loopback feature enabled, it will take "password1" as a new candidate and the rule &#36;1 is applied. It will now crack:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>1e5c2776cf544e213c3d279c40719643:password11</blockquote>
<br />
This goes on and on, until there is no new hash cracked and therefore new password re-added to the queue.<br />
<br />
Where is this useful in real life? For example when cracking millions of hashes at once to build you dictionaries. If you run it with many rules chances are good to automatically detect a <span style="text-decoration: underline;" class="mycode_u">pattern</span> in that hashlist.<br />
<br />
Now we can go back to the password candidates on-the-fly. When we thought about how to add that request we came up with the idea of the induction directory. This directory can be defined with the new parameter "--induction-dir" or you skip specifying it and oclHashcat will define it as &#36;session.induct. oclHashcat will create that directory for you automatically (and remove it afterwards). While oclHashcat is running you can put files into that new directory which will be scanned by oclHashcat as soon as the current dictionary finishes.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Rewrote weak-hash check</span><br />
<hr class="mycode_hr" />
<br />
This feature goes back to the following trac ticket: <a href="https://hashcat.net/trac/ticket/165" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/165</a><br />
<br />
Note that our implementation is not exactly as it was requested in the ticket.<br />
<br />
I'll explain: The goal of this feature is to notice if there is a hash whose plaintext is empty, that means a 0-length password. Typically when you just hit enter. We call it a weak-hash check even if it should have been called weak-password check but there are simply too many weak-passwords.<br />
<br />
Previous version did support this, but only for unsalted hashes. That was easy to implement because on unsalted hashes the 0-length password always results in the same hash. By simply checking that hash, it was possible to find out if it's used. Thing is getting more complicated when a salt is involved. That means that we actually have to run the kernel and create a 0-length password result but with exactly that salt. But that wasn't too easy because oclHashcat has different attack-modes and depending on which attack-mode you choose a different kernel is loaded. Therefore the attack parameters change and we have to create different 0-length password attacks for each attack-mode a user can choose. But that's not all. There are also many differences if some special parameters are set for slow hashes and for fast hashes. That were those problems to solve just to get it working, but that's done, no more headache with this.<br />
<br />
The next problem, however, is if your hashlist contains millions of salts. As already explained above, we have to run a kernel for each salt. If you want to check for empty passwords for that many salts you will have a very long initialization/startup time by running oclHashcat. To work around this problem we added a parameter called "--weak-hash-threshold". With it you can set a maximum number of salts for which weak hashes should be checked on start. The default is set to 100, that means if you use a hashlist with 101 unique salts it will not try to do a weak-hash check at all. Note we are talking about unique salts not unique hashes. Cracking unsalted hashes results in 1 unique salt (an empty one). That means if you set it to 0 you are disabling it completely, also for the unsalted hashes.<br />
<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Reload previously-cracked hashes from potfile</span><br />
<hr class="mycode_hr" />
<br />
With this feature added, oclHashcat will read the potfile every time oclHashcat starts and compares the content of the .pot file (the cracked hashes) with the hashes from the hashlist it is trying to crack. This is something that is present in JtR, and JtR users will alredy know how this works, but we've added it for a different reason.<br />
<br />
When we rewrote the restore feature, we had that problem that, in case of a restore, oclHashcat did not know which hash were already cracked in the previous run. Unless you use --remove, which automatically removes all cracked hashes from your hashlist in real-time, it would start cracking the same hashes again, depending on your attack-type.<br />
<br />
There's just one solution: you need to keep track of the hashes that have been cracked already, and compare it on every start with the hashlist. This is typically a very fast process, but if you have a lot of entries in your potfile, it can take some time. However, it is save to remove the potfile if you don't need it any longer. The potfile name is &#36;session.potfile. If you dont want to remove the potfile you can also skip the loading delay by disabling the use of this new feature with the "--potfile-disable" flag completetly. But note, this also disables the writing of it. If you crack a hash it will create confusion if you want to restore a session. Make sure you know what you do.<br />
<br />
The way this feature compares and finds hashes is basically the same as when reading files from the outfile directories.<br />
<br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b">Full Changeset</span><br />
<hr class="mycode_hr" />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD Catalyst v14.4 (mantle) driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for AMD new GPUs: "Spectre", "Spooky", "Kalindi", "Hainan", "Iceland", "Tonga" and "Mullins"<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV ForceWare 331.67 driver<br />
<br />
Type: Driver<br />
File: Kernel<br />
Desc: Added support for NV new GPUs: "sm_50" (Maxwell)<br />
<br />
Type: Reimplementation<br />
File: Kernel<br />
Desc: Rewrote multihash structure, ex: 290x can now load up to 100,000,000+ MD5/NTLM hashes at once<br />
<br />
Type: Reimplementation<br />
File: Kernel and Host<br />
Desc: Rewrote rule engines (CPU and GPU) and made them more robust by synchronizing error handling<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote restore system from scratch; no longer requires same system with same GPUs<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Restructured .restore file; no longer create huge .restore files, stay &lt; 2k of size<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote weak-hash check; support all algorithm types including salted ones<br />
Trac: #165<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote workload dispatching when progress is near to keyspace end; act more conservative<br />
<br />
Type: Reimplementation<br />
File: Host<br />
Desc: Rewrote mechanism to control the fan with AMD GPUs<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 22 = Juniper Netscreen/SSG (ScreenOS)<br />
Trac: #235<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 200 = MySQL323<br />
Trac: #377<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 1421 = hMailServer<br />
Trac: #401<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 2410 = Cisco-ASA MD5<br />
Trac: #365<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4400 = md5(sha1(&#36;pass))<br />
Trac: #198<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4500 = Double SHA1<br />
Trac: #390<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4700 = sha1(md5(&#36;pass))<br />
Trac: #198<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 4800 = MD5(Chap), iSCSI CHAP authentication<br />
Trac: #214<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6251 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES + hidden-volume<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6261 = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512 + AES + hidden-volume<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6271 = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool + AES + hidden-volume<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 6281 = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 + AES + hidden-volume + boot-mode<br />
Trac: #378<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7300 = IPMI2 RAKP HMAC-SHA1<br />
Trac: #233<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7600 = Redmine Project Management Web App<br />
Trac: #391<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7700 = SAP CODVN B (BCODE)<br />
Trac: #177<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7800 = SAP CODVN F/G (PASSCODE)<br />
Trac: #177<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 7900 = Drupal7<br />
Trac: #326<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8000 = Sybase ASE<br />
Trac: #193<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8100 = Citrix Netscaler<br />
Trac: #369<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8200 = 1Password, cloudkeychain<br />
Trac: #126<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8300 = DNSSEC (NSEC3)<br />
Trac: #387<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8400 = WBB3, Woltlab Burning Board 3<br />
Trac: #181<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for algorithm -m 8500 = RACF<br />
Trac: #192<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for &#36;2y&#36; and &#36;2a&#36; bcrypt signatures<br />
Trac: #251<br />
<br />
Type: Feature<br />
File: Kernel<br />
Desc: Added support for higher cost factors for -m 400 = phpass<br />
Trac: #280<br />
<br />
Type: Feature<br />
File: Kernels<br />
Desc: Increased support for username length up to 20 for -m 1100 = Domain Cached Credentials, mscash<br />
Trac: #379<br />
<br />
Type: Feature<br />
File: Kernels<br />
Desc: Increased support for username length up to 20 for -m 2100 = Domain Cached Credentials2, mscash2<br />
Trac: #379<br />
<br />
Type: Feature<br />
File: Kernels<br />
Desc: Added support for mixed cracking WPA and WPA2 at once, no more need for split<br />
Trac: #388<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for Tesla Deployment Kit v5.319.85<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --workload-profile to give the user a convenient way to set the reduced, default or tuned performance tuning options<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter -s for use in distributed computing, mark skip of range of keyspace<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter -l for use in distributed computing, mark length of range of keyspace<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --keyspace for use in distributed computing, calculate keyspace<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Load already cracked hashes from potfile on startup to avoid double cracking<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added inline induction directory that can be used for on-the-fly adding of new password candidates<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --loopback to automatically write cracked plains into a file in the induction directory<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added debugging support for rules as in hashcat CPU; used for rule- and dictionary efficiency analysis<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --debug-mode and --debug-file to write found plains and/or rules as in hashcat CPU<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --debug-mode 4 == original_plain:rule:modified_plain<br />
Trac: #317<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added tweaks for AMD OverDrive 6 (powercontrol, core- and mem-clock profiles)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --powertune-disable to allow users to disable automatic power tuning for AMD OverDrive 6<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --induction-dir to allow the users to specify the folder which will be used instead of the default induct folder<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --outfile-check-dir to allow the users to specify the folder which should be monitored for cracked hashes<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added --outfile-check-timer to allow the users to control the outfile/potfile reading frequency (0 = disabled)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added periodic outfile reading such that user can remove hashes while cracking by appending the hash[<img src="https://hashcat.net/forum/images/smilies/confused.gif" alt="Confused" title="Confused" class="smilie smilie_13" />alt]:plain to the file<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for automatic detection for hashfile-formats like pwdump, passwd, shadow, etc. <br />
Trac: #393<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Undo fan speed changes by oclHashcat after stopping/aborting<br />
Trac: #238<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support loading &#36;HEX[...] format from dictionaries<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --outfile-autohex-disable to disable &#36;HEX[...] format<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added switch --hex-wordlist to enable parsing words in wordlists given in hex<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Increased maximum bitmap size to 24 bits to speed up cracking of huge hashlists at once<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --bitmap-max to help loading huge hashlists and with small gpu ram<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --weak-hash-threshold to set a maximum number of salts for which weak hashes should be checked<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --remove-timer to set the frequency the hash-file should be updated when using --remove<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added bit for parameter --outfile-format to print the position of a candidate that cracked a hash<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter --status-automat to let oclHashcat display the status view in a machine readable format<br />
Trac: #406<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added column "Skipped" to status display to showing skipped candidates because of cracked salt(s)<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Improved handling of signals and terminate events; SIGTERM support and windows cmd close handling<br />
Trac: #143<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added ability to use restore files from previous versions in case the structure did not change<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Set default retain and abort temperatures for AMD OverDrive6 GPUs according to the values reported by ADL<br />
Trac: #225<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added parameter -v to displays the version string (as -V does)<br />
Trac: #252<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support to load and save invalid salt characters used in descrypt<br />
Trac: #269, #405<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added support for variable iteration number for -m 2100 = mscash2<br />
Trac: #380<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: outfile-check and potfile remove (at startup) can now also be used together with hash mode 2500 = WPA/WPA2 and 6800 = Lastpass<br />
Trac: #400<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: Added rules_optimizer standalone binary for use with debug-rules mode 3 output files<br />
<br />
Type: Feature<br />
File: Host<br />
Desc: While parsing hashes on start inform user about the progress<br />
<br />
Type: Feature<br />
File: Rules<br />
Desc: Added InsidePro-HashManager.rule<br />
<br />
Type: Feature<br />
File: Rules<br />
Desc: Added generated2.rule, each one cracked a real hash, sorted by occourance. use head -XXXX to make a top XXXX<br />
Cred: EvilMog<br />
<br />
Type: Change<br />
File: Rules<br />
Desc: Renamed passwordspro.rule to InsidePro-PasswordsPro.rule<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Modified output plains to &#36;HEX[...] format in case cracked password contains chars outside 0x20 - 0x80 ASCII range<br />
Trac: #148<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Modified switch --potfile-disable to disable loading already cracked hashes from potfile on startup<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Save potfile and dicstat in the current working directory instead of installation directory<br />
Trac: #281<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Change input hash format for -m 2100 = mscash2<br />
Trac: #380<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Update tab completion for bash (in extra folder) to match up with new parameters<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed switch --disable-potfile to --potfile-disable to match up parameter logic<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed switch --disable-restore to --restore-disable to match up parameter logic<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Help and docs update to underline that OSX 10.9 uses same format as 10.8<br />
Trac: #236<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Help and docs update to underline that MSSQL(2014) uses same format as MSSQL(2012)<br />
<br />
Type: Change<br />
File: Docs<br />
Desc: Removed examples.txt; see wiki for more information<br />
Trac: #236<br />
<br />
Type: Change<br />
File: Host<br />
Desc: Renamed hash type Joomla into 'Joomla &lt; 2.5.18', -m 400 has now also the note about MD5(Joomla)<br />
Trac: #402<br />
<br />
Type: Bug<br />
File: Kernel<br />
Desc: Raw whirlpool -m 6100 hashes could not be cracked in -a 1 combinator mode<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: If increment and masks were used in combination, status display needs reset to INIT after each iteration<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: In attack-mode 1 and 7, if at least one word in right wordlist is exactly of length 31, memory corruption occoured over time<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Status timer should be enabled by default when in stdin mode<br />
Trac: #218<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: Improved reading of fan speed and temperature; It sometimes failed when using twin GPUs on windows<br />
Trac: #231<br />
<br />
Type: Bug<br />
File: Host<br />
Desc: File handling ('Permission denied' error) fixed when using --remove with -m 2500<br />
Trac: #395<br />
<br />
Type: Distribution<br />
File: Packages<br />
Desc: Created two packages for download: oclHashcat-* for AMD, cudaHashcat-* for CUDA<br />
</span></blockquote>
<br />
One last thing: With this update you'll be able to load pwdump, passwd and shadow unmodified. If you want other native formats added, please update this ticket: <a href="https://hashcat.net/trac/ticket/393" target="_blank" rel="noopener" class="mycode_url">https://hashcat.net/trac/ticket/393</a><br />
<br />
--<br />
atom]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.01]]></title>
			<link>https://hashcat.net/forum/thread-2969.html</link>
			<pubDate>Tue, 31 Dec 2013 23:42:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2969.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="http://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.12<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --generate-rules-seed, sets seed used for randomization so rulesets can be reproduced<br />
<br />
type: feature<br />
file: host programs<br />
desc: updated/added some hcchr charset files in /charsets, some new files: Bulgarian, Polish, Hungarian<br />
cred: Rub3nCT<br />
<br />
type: bug<br />
file: host programs<br />
desc: when using -m 2500 w/ multi hccap files there was no error shown if the user mixed WPA and WPA2 networks, this is currently not allowed<br />
trac: #222<br />
</span></blockquote>
]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="http://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.12<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --generate-rules-seed, sets seed used for randomization so rulesets can be reproduced<br />
<br />
type: feature<br />
file: host programs<br />
desc: updated/added some hcchr charset files in /charsets, some new files: Bulgarian, Polish, Hungarian<br />
cred: Rub3nCT<br />
<br />
type: bug<br />
file: host programs<br />
desc: when using -m 2500 w/ multi hccap files there was no error shown if the user mixed WPA and WPA2 networks, this is currently not allowed<br />
trac: #222<br />
</span></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[oclHashcat v1.00]]></title>
			<link>https://hashcat.net/forum/thread-2897.html</link>
			<pubDate>Fri, 06 Dec 2013 21:41:20 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1">atom</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2897.html</guid>
			<description><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="http://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">oclHashcat v1.00 is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15</span><br />
<br />
The reason for fusion was:<br />
<ul class="mycode_list"><li>Simplify the project! Users were confused which tool among -lite and -plus they should choose. <br />
</li>
<li>Fusioned oclHashcat will automatically decide which kernel type to choose based on the attack-mode and the hash-type you selected<br />
</li>
<li>Save maintaining two programs with nearly the same codebase<br />
</li>
<li>Save disk-space and packages<br />
</li>
</ul>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">This release is alot about performance and bugs</span><br />
<br />
While -plus v0.15 focused on supporting password candidates with length 15+, which in some cases reduced cracking speed, we can say that with oclHashcat v1.00 most of the speed loss that inevitabely was introduced with -plus v0.15 got compensated for many hash types by heavily optimizing the new kernels (e.g. merging -plus kernels with -lite and continuing optimizing the resulting kernel). You will see some nice increase of cracking speed for some hash-types (e.g. raw MD5 on NVidia from ~1600MH/s -&gt; 1800MH/s), see benchmarking section.<br />
<br />
We've also written an fully automated testing system, cross-platform. We found some bugs which were all fixed. If you want to try it on your system just come to IRC and we'll instruct you how to run it.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Workaround driver problems</span><br />
<br />
Whenever AMD or NVidia releases new drivers we have to check if our code still works. Most of the time it just works, but sometimes they add bugs to their driver that influences (or heavily influences) oclHashcat.<br />
<br />
One example was the Catalyst 13.8beta driver, which is known to have some bugs that influence oclHashcat. We had to mark it as "broken" and were printing out a warning message whenever a user wanted to run -lite or -plus using this driver.<br />
<br />
That was a very restrictive way of handling that type of problem and made package maintainers mad. This behavior forced the distribution to stick to a specific driver version. So we decided to find out where the bugs in the drivers are and then try to workaround them.<br />
<br />
That done, we worked around all (known) bugs so you will be able to use all drivers from Catalyst 13.4 and upwards.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Built-in benchmarking system</span><br />
<br />
While this feature was in -lite for some time, it's new for -plus users. This "tool" will show you which maximum performance you can get out of your system in an ideal cracking case. Such a case is usually trying to crack a single hash using the brute-force attack mode, because we can make use of a lot of different optimization techniques.<br />
<br />
It has been fine-tuned to use near-to-perfect tuned workloads (-n and -u parameters) and it is using a huge keyspace. Whenever you run an attack there are many factors that can influence cracking speed. By using the benchmark system you can get an idea what your maximum possible cracking speed could be and optimize your attack.<br />
<br />
Most of the basic commandline parameters can be used in addition, for example you can use -d to select which GPU(s) or card(s) to run in benchmark mode. Or, if you want to benchmark just a single hash type you can use the -m parameter.<br />
<br />
There are two different benchmark-modes. The default sets the configuration to run in benchmark-mode 1, which is the more aggressive one. It's what most people will use and thats it. If you switch to benchmark-mode 0 you can manually tune -n and -u value to even more aggressive values but make sure you have good GPU cooling.<br />
<br />
It's also a very simple way to benchmark your system and compare it with others. To have some fun after downloading oclHashcat v1.00 just run it with e.g. "./oclHashcat64.bin -b", that's it.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Multi-hccap support</span><br />
<br />
Starting with this release, oclHashcat supports .hccap files for WPA cracking that include several networks (both with different or same ESSID). The file format is basically using the same struct as before, but one .hccap file can now consist of several such structures.<br />
<br />
This implies that you could simply merge two or more .hccap files together into a new .hccap file that contains all of the merged information. A simple "cat 1st.hccap 2nd.hccap &gt; all.hccap" should suffice to get you started with this new feature (on windows use an equivalent command).<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Support for new algorithms</span><br />
<ul class="mycode_list"><li>HMAC-* (key = &#36;pass)<br />
</li>
<li>HMAC-* (key = &#36;salt)<br />
</li>
<li>sha1(LinkedIn)<br />
</li>
<li>Kerberos 5 AS-REQ Pre-Auth etype 23<br />
</li>
</ul>
* = MD5, SHA1, SHA256, SHA512<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
* initial version 1.00<br />
<br />
first public release, oclHashcat is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.8b*<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.9<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.11b*<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD R9 series<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.9<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 50 = HMAC-MD5 (key = &#36;pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 60 = HMAC-MD5 (key = &#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 150 = HMAC-SHA1 (key = &#36;pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 160 = HMAC-SHA1 (key = &#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 190 = sha1(LinkedIn)<br />
trac: #190<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1450 = HMAC-SHA256 (key = &#36;pass)<br />
trac: #97<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1460 = HMAC-SHA256 (key = &#36;salt)<br />
trac: #97<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1750 = HMAC-SHA512 (key = &#36;pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1760 = HMAC-SHA512 (key = &#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 7500 = Kerberos 5 AS-REQ Pre-Auth etype 23<br />
<br />
type: feature<br />
file: host programs<br />
desc: added tab completion feature for bash in extra folder<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for Tesla Deployment Kit v5.319.43<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for NVAPI R319<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --benchmark, run several hash modes in benchmark mode for speed tests<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --disable-restore option, don't write/update nor touch restore file<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --cleanup-rules, remove rules that couldn't be used or have duplicates. A .bak backup file will be created<br />
trac: #139<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for hccap files containing several networks<br />
trac: #167<br />
<br />
type: feature<br />
file: host programs<br />
desc: show the status by hitting the s key or the Enter key, show the status when dict or mask changed<br />
trac: #189<br />
<br />
type: feature<br />
file: host programs<br />
desc: show line progress for maskfiles (.hcmask)<br />
trac: #206<br />
<br />
type: rules<br />
file: T0XlC.rule<br />
desc: cleaned, original T0XlC.rule<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlCv1.rule<br />
desc: added ruleset with 12000 random rules<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlC_insert_00-99_1950-2050_toprules_0_F.rule<br />
desc: added ruleset with insert rules from position 0 to position F (00-99,1950-2050)<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlC_insert_space_and_special_0_F.rule<br />
desc: added ruleset with insert rules from position 0 to position F (special characters)<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlC_insert_top_100_passwords_1_G.rule<br />
desc: added ruleset with insert rules from position 0 to position F (top 100 passwords)<br />
cred: T0XlC<br />
<br />
type: bug<br />
file: host programs<br />
desc: problem while performing the --remove operation in windows fixed - timing problem (Permission denied error)<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed mask length display in status screen when using hash types that internally use unicode<br />
<br />
type: bug<br />
file: host programs<br />
desc: Hash files that did not end with a newline character were not parsed correctly<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed crash when hitting CTRL-C, when receiving abort signals<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed freeze, flush problem w/ progress at ~100%<br />
trac: #82<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed russian charset files (hcchr), removed unnecessary chars<br />
trac: #194<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixes a crash when using --username together with --remove<br />
trac: #197<br />
<br />
type: change<br />
file: host programs<br />
desc: new default status-timer value is 10 seconds instead of 1 minute<br />
</span></blockquote>
]]></description>
			<content:encoded><![CDATA[<hr class="mycode_hr" />
<br />
Download here: <a href="http://hashcat.net/oclhashcat/" target="_blank" rel="noopener" class="mycode_url">http://hashcat.net/oclhashcat/</a><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">oclHashcat v1.00 is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15</span><br />
<br />
The reason for fusion was:<br />
<ul class="mycode_list"><li>Simplify the project! Users were confused which tool among -lite and -plus they should choose. <br />
</li>
<li>Fusioned oclHashcat will automatically decide which kernel type to choose based on the attack-mode and the hash-type you selected<br />
</li>
<li>Save maintaining two programs with nearly the same codebase<br />
</li>
<li>Save disk-space and packages<br />
</li>
</ul>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">This release is alot about performance and bugs</span><br />
<br />
While -plus v0.15 focused on supporting password candidates with length 15+, which in some cases reduced cracking speed, we can say that with oclHashcat v1.00 most of the speed loss that inevitabely was introduced with -plus v0.15 got compensated for many hash types by heavily optimizing the new kernels (e.g. merging -plus kernels with -lite and continuing optimizing the resulting kernel). You will see some nice increase of cracking speed for some hash-types (e.g. raw MD5 on NVidia from ~1600MH/s -&gt; 1800MH/s), see benchmarking section.<br />
<br />
We've also written an fully automated testing system, cross-platform. We found some bugs which were all fixed. If you want to try it on your system just come to IRC and we'll instruct you how to run it.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Workaround driver problems</span><br />
<br />
Whenever AMD or NVidia releases new drivers we have to check if our code still works. Most of the time it just works, but sometimes they add bugs to their driver that influences (or heavily influences) oclHashcat.<br />
<br />
One example was the Catalyst 13.8beta driver, which is known to have some bugs that influence oclHashcat. We had to mark it as "broken" and were printing out a warning message whenever a user wanted to run -lite or -plus using this driver.<br />
<br />
That was a very restrictive way of handling that type of problem and made package maintainers mad. This behavior forced the distribution to stick to a specific driver version. So we decided to find out where the bugs in the drivers are and then try to workaround them.<br />
<br />
That done, we worked around all (known) bugs so you will be able to use all drivers from Catalyst 13.4 and upwards.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Built-in benchmarking system</span><br />
<br />
While this feature was in -lite for some time, it's new for -plus users. This "tool" will show you which maximum performance you can get out of your system in an ideal cracking case. Such a case is usually trying to crack a single hash using the brute-force attack mode, because we can make use of a lot of different optimization techniques.<br />
<br />
It has been fine-tuned to use near-to-perfect tuned workloads (-n and -u parameters) and it is using a huge keyspace. Whenever you run an attack there are many factors that can influence cracking speed. By using the benchmark system you can get an idea what your maximum possible cracking speed could be and optimize your attack.<br />
<br />
Most of the basic commandline parameters can be used in addition, for example you can use -d to select which GPU(s) or card(s) to run in benchmark mode. Or, if you want to benchmark just a single hash type you can use the -m parameter.<br />
<br />
There are two different benchmark-modes. The default sets the configuration to run in benchmark-mode 1, which is the more aggressive one. It's what most people will use and thats it. If you switch to benchmark-mode 0 you can manually tune -n and -u value to even more aggressive values but make sure you have good GPU cooling.<br />
<br />
It's also a very simple way to benchmark your system and compare it with others. To have some fun after downloading oclHashcat v1.00 just run it with e.g. "./oclHashcat64.bin -b", that's it.<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Multi-hccap support</span><br />
<br />
Starting with this release, oclHashcat supports .hccap files for WPA cracking that include several networks (both with different or same ESSID). The file format is basically using the same struct as before, but one .hccap file can now consist of several such structures.<br />
<br />
This implies that you could simply merge two or more .hccap files together into a new .hccap file that contains all of the merged information. A simple "cat 1st.hccap 2nd.hccap &gt; all.hccap" should suffice to get you started with this new feature (on windows use an equivalent command).<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Support for new algorithms</span><br />
<ul class="mycode_list"><li>HMAC-* (key = &#36;pass)<br />
</li>
<li>HMAC-* (key = &#36;salt)<br />
</li>
<li>sha1(LinkedIn)<br />
</li>
<li>Kerberos 5 AS-REQ Pre-Auth etype 23<br />
</li>
</ul>
* = MD5, SHA1, SHA256, SHA512<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Full changelog</span><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-family: Courier;" class="mycode_font"><br />
* initial version 1.00<br />
<br />
first public release, oclHashcat is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.8b*<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.9<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD Catalyst v13.11b*<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD R9 series<br />
<br />
type: driver<br />
file: kernels<br />
desc: added support for AMD APP SDK v2.9<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 50 = HMAC-MD5 (key = &#36;pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 60 = HMAC-MD5 (key = &#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 150 = HMAC-SHA1 (key = &#36;pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 160 = HMAC-SHA1 (key = &#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 190 = sha1(LinkedIn)<br />
trac: #190<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1450 = HMAC-SHA256 (key = &#36;pass)<br />
trac: #97<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1460 = HMAC-SHA256 (key = &#36;salt)<br />
trac: #97<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1750 = HMAC-SHA512 (key = &#36;pass)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 1760 = HMAC-SHA512 (key = &#36;salt)<br />
<br />
type: feature<br />
file: kernels<br />
desc: added -m 7500 = Kerberos 5 AS-REQ Pre-Auth etype 23<br />
<br />
type: feature<br />
file: host programs<br />
desc: added tab completion feature for bash in extra folder<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for Tesla Deployment Kit v5.319.43<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for NVAPI R319<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --benchmark, run several hash modes in benchmark mode for speed tests<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --disable-restore option, don't write/update nor touch restore file<br />
<br />
type: feature<br />
file: host programs<br />
desc: added --cleanup-rules, remove rules that couldn't be used or have duplicates. A .bak backup file will be created<br />
trac: #139<br />
<br />
type: feature<br />
file: host programs<br />
desc: added support for hccap files containing several networks<br />
trac: #167<br />
<br />
type: feature<br />
file: host programs<br />
desc: show the status by hitting the s key or the Enter key, show the status when dict or mask changed<br />
trac: #189<br />
<br />
type: feature<br />
file: host programs<br />
desc: show line progress for maskfiles (.hcmask)<br />
trac: #206<br />
<br />
type: rules<br />
file: T0XlC.rule<br />
desc: cleaned, original T0XlC.rule<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlCv1.rule<br />
desc: added ruleset with 12000 random rules<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlC_insert_00-99_1950-2050_toprules_0_F.rule<br />
desc: added ruleset with insert rules from position 0 to position F (00-99,1950-2050)<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlC_insert_space_and_special_0_F.rule<br />
desc: added ruleset with insert rules from position 0 to position F (special characters)<br />
cred: T0XlC<br />
<br />
type: rules<br />
file: T0XlC_insert_top_100_passwords_1_G.rule<br />
desc: added ruleset with insert rules from position 0 to position F (top 100 passwords)<br />
cred: T0XlC<br />
<br />
type: bug<br />
file: host programs<br />
desc: problem while performing the --remove operation in windows fixed - timing problem (Permission denied error)<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed mask length display in status screen when using hash types that internally use unicode<br />
<br />
type: bug<br />
file: host programs<br />
desc: Hash files that did not end with a newline character were not parsed correctly<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed crash when hitting CTRL-C, when receiving abort signals<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed freeze, flush problem w/ progress at ~100%<br />
trac: #82<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixed russian charset files (hcchr), removed unnecessary chars<br />
trac: #194<br />
<br />
type: bug<br />
file: host programs<br />
desc: Fixes a crash when using --username together with --remove<br />
trac: #197<br />
<br />
type: change<br />
file: host programs<br />
desc: new default status-timer value is 10 seconds instead of 1 minute<br />
</span></blockquote>
]]></content:encoded>
		</item>
	</channel>
</rss>