<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[hashcat Forum - Feature Requests]]></title>
		<link>https://hashcat.net/forum/</link>
		<description><![CDATA[hashcat Forum - https://hashcat.net/forum]]></description>
		<pubDate>Sun, 19 Apr 2026 04:45:41 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[[oclHashcat-plus] Multiple Dicts in Hybrid Attack]]></title>
			<link>https://hashcat.net/forum/thread-2078.html</link>
			<pubDate>Sat, 16 Feb 2013 15:01:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2710">TrAnn3l</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2078.html</guid>
			<description><![CDATA[Hello, i wanted to ask if it's possible, to add multiple dictionary support to oclhashcat-plus while using hybrid attack.<br />
<br />
Thanks for reading <img src="https://hashcat.net/forum/images/smilies/wink.gif" alt="Wink" title="Wink" class="smilie smilie_2" />]]></description>
			<content:encoded><![CDATA[Hello, i wanted to ask if it's possible, to add multiple dictionary support to oclhashcat-plus while using hybrid attack.<br />
<br />
Thanks for reading <img src="https://hashcat.net/forum/images/smilies/wink.gif" alt="Wink" title="Wink" class="smilie smilie_2" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[!!!README FOR BUG/FEATURE REQUESTS!!!]]></title>
			<link>https://hashcat.net/forum/thread-2070.html</link>
			<pubDate>Thu, 14 Feb 2013 00:41:27 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=248">radix</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2070.html</guid>
			<description><![CDATA[Since it was never really put out there:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Search for like bugs before you post a new one.</span><br />
<br />
All bug/feature requests should be logged via Github:<br />
<br />
<a href="https://github.com/hashcat/oclHashcat/issues" target="_blank" rel="noopener" class="mycode_url">oclHashcat</a><br />
<a href="https://github.com/hashcat/hashcat/issues" target="_blank" rel="noopener" class="mycode_url">Hashcat</a><br />
<br />
You will need to create a github account if you do not already have one.<br />
<br />
Bug reports should contain AT LEAST:<br />
<br />
Operating system and arch: IE<br />
windows 7 x86<br />
<br />
Version of the driver installed: IE<br />
Catalyst 12.8<br />
<br />
version you are using: IE<br />
hashcat-0.42<br />
<br />
The command: IE<br />
hashcat-cli32.exe -m 100 hashes dictionary -g 100<br />
<br />
The error: IE<br />
crashes and spits out a bunch of strange code<br />
<br />
Attach:<br />
any dumps, or debugging info from the screen, take a screenshot, add clinfo output (for ocl). <br />
<br />
Bug reports not following this format will be closed and ignored until posted in the correct format.]]></description>
			<content:encoded><![CDATA[Since it was never really put out there:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Search for like bugs before you post a new one.</span><br />
<br />
All bug/feature requests should be logged via Github:<br />
<br />
<a href="https://github.com/hashcat/oclHashcat/issues" target="_blank" rel="noopener" class="mycode_url">oclHashcat</a><br />
<a href="https://github.com/hashcat/hashcat/issues" target="_blank" rel="noopener" class="mycode_url">Hashcat</a><br />
<br />
You will need to create a github account if you do not already have one.<br />
<br />
Bug reports should contain AT LEAST:<br />
<br />
Operating system and arch: IE<br />
windows 7 x86<br />
<br />
Version of the driver installed: IE<br />
Catalyst 12.8<br />
<br />
version you are using: IE<br />
hashcat-0.42<br />
<br />
The command: IE<br />
hashcat-cli32.exe -m 100 hashes dictionary -g 100<br />
<br />
The error: IE<br />
crashes and spits out a bunch of strange code<br />
<br />
Attach:<br />
any dumps, or debugging info from the screen, take a screenshot, add clinfo output (for ocl). <br />
<br />
Bug reports not following this format will be closed and ignored until posted in the correct format.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[oclHashcat-lite] WPA/WPA2]]></title>
			<link>https://hashcat.net/forum/thread-2026.html</link>
			<pubDate>Fri, 01 Feb 2013 20:43:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2512">Kuci</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2026.html</guid>
			<description><![CDATA[Hello, I think, it's good idea to implement WPA/WPA2 into oclHashcat-lite. Since oclHashcat-lite is focused at one-shot cracks and it supports up to 54 characters long passwords, it'd be good to implement this algo., when even descrypt is implemented. I have speed of 15500 k c/s on WPA with oclHashcat-plus on my ATI Radeon HD 4850 and on <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">oclHashcat-lite</a>s site we can see, that descrypt has speed of 19400 k c/s on NVidia gtx560Ti, which is as fast as my graphics card.<br />
What do you think ?]]></description>
			<content:encoded><![CDATA[Hello, I think, it's good idea to implement WPA/WPA2 into oclHashcat-lite. Since oclHashcat-lite is focused at one-shot cracks and it supports up to 54 characters long passwords, it'd be good to implement this algo., when even descrypt is implemented. I have speed of 15500 k c/s on WPA with oclHashcat-plus on my ATI Radeon HD 4850 and on <a href="http://hashcat.net/oclhashcat-lite/" target="_blank" rel="noopener" class="mycode_url">oclHashcat-lite</a>s site we can see, that descrypt has speed of 19400 k c/s on NVidia gtx560Ti, which is as fast as my graphics card.<br />
What do you think ?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Add ntlm v1/v2 challenge respose (netntlm, netntlmv2) support to hashcat plus]]></title>
			<link>https://hashcat.net/forum/thread-2011.html</link>
			<pubDate>Wed, 30 Jan 2013 03:45:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2650">vima</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-2011.html</guid>
			<description><![CDATA[Hi<br />
<br />
We have been using oclhashcat-plus for several months now to do GPU cracking of passwords obtained during pentests, and it works great!  <br />
<br />
During this period however, theres one hash type that we continually find ourselves capturing that hashcat doesnt support - NTLM challenge response hashes.  We often grab these using something like the SMB capture module from Metasploit, and have always had to resort to using John the Ripper to crack them, as there is no GPU based cracker that we are aware of that will do the job.  Attempting to crack these hashes using CPU when you have an 8 GPU system sitting idle is the definition of pain.<br />
<br />
Consequently, Id like to request that support be added for NTLM challenge response version 1 and 2 (known in john as netntlm and netntlmv2) in oclHashcat-plus. <br />
<br />
<br />
References for these protocols are here:<br />
<a href="http://en.wikipedia.org/wiki/NTLM" target="_blank" rel="noopener" class="mycode_url">http://en.wikipedia.org/wiki/NTLM</a><br />
<a href="http://davenport.sourceforge.net/ntlm.html" target="_blank" rel="noopener" class="mycode_url">http://davenport.sourceforge.net/ntlm.html</a><br />
<br />
I'll provide a quick summary of the generation of NTLMv1, since that the bit Im most interested in at the moment.  Im happy to also do this for NTLMv2 if it will help and youre interested in implementing it.<br />
<br />
Hash creation requires a password ('hashcat' in the example below) and a variable 8 byte challenge (0x1122334455667788 is used in the example below) which is provided by the server to the client during the auth process.  NTLMv1 usually generates two hashes, one based on LM hashes, and the other based on NTLM ones, although if LM hashes are disabled (e.g. via domain policy) then you wont get anything useful for the LM portion.  I'll cover the generation of the NTLM version of the hash below (this is what is implemented as netntlm in john).  The generation of the LM hash in NTLMv1 (implemented in john as netlm) is exactlty the same, but uses the LM hash in place of the NTLM one.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step 1</span><br />
<br />
The client converts the password (hashcat) to a NTLM hash by Unicoding the password and running it though MD4:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -&gt; b4b9b02e6f09a9bd760f388b67351e2b</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 2</span><br />
<br />
5 null bytes are appended to the hash to take it to 21 bytes:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b4b9b02e6f09a9bd760f388b67351e2b0000000000</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 3</span><br />
<br />
The value is then split in 3 x 56 bit parts:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b4b9b02e6f09a9<br />
bd760f388b6735<br />
1e2b0000000000</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 4</span><br />
<br />
Each 56 bit part is odd parity adjusted to result in 3 x 64 bit parts.  (Convert to binary, break into 8 x 7 bit chunks, append an odd parity bit to each chunk to result in 8 x 8 bit chunks. Then concatenate the chunks into 64 bit parts.) :<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b4b9b02e6f09a9 -&gt; b55d6d04e6792652<br />
bd760f388b6735 -&gt; bcba83e6895b9d6b<br />
1e2b0000000000 -&gt; 1f15c10101010101</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 5</span><br />
<br />
Each of these values is then used as a key to DES encrypt the 8 byte challenge (for this example a value of 1122334455667788 is used) resulting in 3 ciphertext blocks:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b55d6d04e6792652 KEY-&gt; DES(1122334455667788) -&gt; 51a539e6ee061f64<br />
bcba83e6895b9d6b KEY-&gt; DES(1122334455667788) -&gt; 7cd5d48ce6c68665<br />
1f15c10101010101 KEY-&gt; DES(1122334455667788) -&gt; 3737c5e1de26ac4c</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 6</span><br />
<br />
The ciphertext blocks are then concatenated together to provide the final result:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>51a539e6ee061f647cd5d48ce6c686653737c5e1de26ac4c</code></div></div><br />
<br />
Let me know if any clarification is needed]]></description>
			<content:encoded><![CDATA[Hi<br />
<br />
We have been using oclhashcat-plus for several months now to do GPU cracking of passwords obtained during pentests, and it works great!  <br />
<br />
During this period however, theres one hash type that we continually find ourselves capturing that hashcat doesnt support - NTLM challenge response hashes.  We often grab these using something like the SMB capture module from Metasploit, and have always had to resort to using John the Ripper to crack them, as there is no GPU based cracker that we are aware of that will do the job.  Attempting to crack these hashes using CPU when you have an 8 GPU system sitting idle is the definition of pain.<br />
<br />
Consequently, Id like to request that support be added for NTLM challenge response version 1 and 2 (known in john as netntlm and netntlmv2) in oclHashcat-plus. <br />
<br />
<br />
References for these protocols are here:<br />
<a href="http://en.wikipedia.org/wiki/NTLM" target="_blank" rel="noopener" class="mycode_url">http://en.wikipedia.org/wiki/NTLM</a><br />
<a href="http://davenport.sourceforge.net/ntlm.html" target="_blank" rel="noopener" class="mycode_url">http://davenport.sourceforge.net/ntlm.html</a><br />
<br />
I'll provide a quick summary of the generation of NTLMv1, since that the bit Im most interested in at the moment.  Im happy to also do this for NTLMv2 if it will help and youre interested in implementing it.<br />
<br />
Hash creation requires a password ('hashcat' in the example below) and a variable 8 byte challenge (0x1122334455667788 is used in the example below) which is provided by the server to the client during the auth process.  NTLMv1 usually generates two hashes, one based on LM hashes, and the other based on NTLM ones, although if LM hashes are disabled (e.g. via domain policy) then you wont get anything useful for the LM portion.  I'll cover the generation of the NTLM version of the hash below (this is what is implemented as netntlm in john).  The generation of the LM hash in NTLMv1 (implemented in john as netlm) is exactlty the same, but uses the LM hash in place of the NTLM one.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step 1</span><br />
<br />
The client converts the password (hashcat) to a NTLM hash by Unicoding the password and running it though MD4:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>hashcat -&gt; b4b9b02e6f09a9bd760f388b67351e2b</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 2</span><br />
<br />
5 null bytes are appended to the hash to take it to 21 bytes:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b4b9b02e6f09a9bd760f388b67351e2b0000000000</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 3</span><br />
<br />
The value is then split in 3 x 56 bit parts:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b4b9b02e6f09a9<br />
bd760f388b6735<br />
1e2b0000000000</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 4</span><br />
<br />
Each 56 bit part is odd parity adjusted to result in 3 x 64 bit parts.  (Convert to binary, break into 8 x 7 bit chunks, append an odd parity bit to each chunk to result in 8 x 8 bit chunks. Then concatenate the chunks into 64 bit parts.) :<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b4b9b02e6f09a9 -&gt; b55d6d04e6792652<br />
bd760f388b6735 -&gt; bcba83e6895b9d6b<br />
1e2b0000000000 -&gt; 1f15c10101010101</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 5</span><br />
<br />
Each of these values is then used as a key to DES encrypt the 8 byte challenge (for this example a value of 1122334455667788 is used) resulting in 3 ciphertext blocks:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>b55d6d04e6792652 KEY-&gt; DES(1122334455667788) -&gt; 51a539e6ee061f64<br />
bcba83e6895b9d6b KEY-&gt; DES(1122334455667788) -&gt; 7cd5d48ce6c68665<br />
1f15c10101010101 KEY-&gt; DES(1122334455667788) -&gt; 3737c5e1de26ac4c</code></div></div><br />
<span style="font-weight: bold;" class="mycode_b">Step 6</span><br />
<br />
The ciphertext blocks are then concatenated together to provide the final result:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>51a539e6ee061f647cd5d48ce6c686653737c5e1de26ac4c</code></div></div><br />
<br />
Let me know if any clarification is needed]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[hashcat] Add -j and -k parameters]]></title>
			<link>https://hashcat.net/forum/thread-1974.html</link>
			<pubDate>Sun, 20 Jan 2013 22:41:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2512">Kuci</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1974.html</guid>
			<description><![CDATA[Hello, could you add -j and -k parameters from oclHashcat to hashcat as well ? It would be really helpful. Thank's.]]></description>
			<content:encoded><![CDATA[Hello, could you add -j and -k parameters from oclHashcat to hashcat as well ? It would be really helpful. Thank's.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[thoughts on hashcat-plus v0.12 w64 radeon6670]]></title>
			<link>https://hashcat.net/forum/thread-1936.html</link>
			<pubDate>Fri, 11 Jan 2013 11:23:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2580">falcon111</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1936.html</guid>
			<description><![CDATA[1. Default session restore file better be placed in temp folder, i don't think writing it onto system volume is such a good idea. I have my system volume on ssd, and writing 22M every couple minutes on it is not good.<br />
2. Default session restore file should include something unique, like pid or something. Thas way i can pause one copy and run another without bothering with session names.<br />
  On --restore you can search for the stored sessions, if there is one only session - restore it, if their number!=1 - give error.<br />
3. Being paused, hashcat updates restore file<br />
4. Sometimes console hangs. I can press 's' key and there's no reaction from the program, but calculations seems to go on though.<br />
5. Runs ended with "Exhausted" sometimes showing time estimated &gt; 10 years.<br />
6. Feature request: attack by dictionary, containing bruteforce masks, so i can specify probable masks in one file and check them all in one run. At this moment i have to write bat-files of several hashcat runs.<br />
7. As i understand, hashcat can't process dictionaries with masks on both ends of the words. Hybrid attacks can add bruteforce masks to one side of the password only, making impossible to find something like 12word34 combinations.<br />
The way i see hybrid attack - add new macros (?w for example) for a dictionary word, then specify dictionary and mask something like ?d?d?w?d?d.<br />
8. Sometimes hashcat crashes on start with no console output.<br />
9. Don't really understand why every run hashcat shows something like NOTE: autotuned --gpu-accel from 32 to 24. Numbers mostly different every run. Not sure why it autotunes parameters, i've specified manually, what --gpu-accel switch for then?<br />
<br />
PS: 1, 2: Second thought on restore session filename. It can be generated on the base of hash-filename. When cracking hash.md5, session name will be hash.md5.restore. It's even better than placing files in temp folder.]]></description>
			<content:encoded><![CDATA[1. Default session restore file better be placed in temp folder, i don't think writing it onto system volume is such a good idea. I have my system volume on ssd, and writing 22M every couple minutes on it is not good.<br />
2. Default session restore file should include something unique, like pid or something. Thas way i can pause one copy and run another without bothering with session names.<br />
  On --restore you can search for the stored sessions, if there is one only session - restore it, if their number!=1 - give error.<br />
3. Being paused, hashcat updates restore file<br />
4. Sometimes console hangs. I can press 's' key and there's no reaction from the program, but calculations seems to go on though.<br />
5. Runs ended with "Exhausted" sometimes showing time estimated &gt; 10 years.<br />
6. Feature request: attack by dictionary, containing bruteforce masks, so i can specify probable masks in one file and check them all in one run. At this moment i have to write bat-files of several hashcat runs.<br />
7. As i understand, hashcat can't process dictionaries with masks on both ends of the words. Hybrid attacks can add bruteforce masks to one side of the password only, making impossible to find something like 12word34 combinations.<br />
The way i see hybrid attack - add new macros (?w for example) for a dictionary word, then specify dictionary and mask something like ?d?d?w?d?d.<br />
8. Sometimes hashcat crashes on start with no console output.<br />
9. Don't really understand why every run hashcat shows something like NOTE: autotuned --gpu-accel from 32 to 24. Numbers mostly different every run. Not sure why it autotunes parameters, i've specified manually, what --gpu-accel switch for then?<br />
<br />
PS: 1, 2: Second thought on restore session filename. It can be generated on the base of hash-filename. When cracking hash.md5, session name will be hash.md5.restore. It's even better than placing files in temp folder.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[WPA/WPA2 in hashcat]]></title>
			<link>https://hashcat.net/forum/thread-1931.html</link>
			<pubDate>Wed, 09 Jan 2013 15:07:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2512">Kuci</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1931.html</guid>
			<description><![CDATA[Due to oclHashcat-plus' limitations I was looking for WPA/WPA2 in hashcat and I was really suprised when I saw hashcat doesn't support it. So, while oclHashcat has its limitations, please, could you add this algorithm to hashcat ?]]></description>
			<content:encoded><![CDATA[Due to oclHashcat-plus' limitations I was looking for WPA/WPA2 in hashcat and I was really suprised when I saw hashcat doesn't support it. So, while oclHashcat has its limitations, please, could you add this algorithm to hashcat ?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HMAC for oclHashcat-*]]></title>
			<link>https://hashcat.net/forum/thread-1927.html</link>
			<pubDate>Tue, 08 Jan 2013 17:28:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1985">fuzztester</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1927.html</guid>
			<description><![CDATA[I noticed that hashcat has support for HMAC-SHA1 / HMAC-MD5 but oclHashcat-plus nor oclHashcat-lite do not.<br />
<br />
Just wondering if its in the plan to get these working so we can use GPUs to crack them.]]></description>
			<content:encoded><![CDATA[I noticed that hashcat has support for HMAC-SHA1 / HMAC-MD5 but oclHashcat-plus nor oclHashcat-lite do not.<br />
<br />
Just wondering if its in the plan to get these working so we can use GPUs to crack them.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[distributed computing for hashcat (cpu)]]></title>
			<link>https://hashcat.net/forum/thread-1906.html</link>
			<pubDate>Fri, 04 Jan 2013 17:25:47 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=963">forumhero</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1906.html</guid>
			<description><![CDATA[Was wondering if there were any plans or discussions to offer distributed computing for cpu hashcat? <br />
<br />
Not that I'm a programmer by any stretch of the imagination but can see this being a good alternative than rewriting Plus to support &gt;15 character passwords and still have somewhat ok speed -- depending on your number of cpus of course. <br />
<br />
I know there are other tools out there that can do this already but thought it would be a great addition to cpu hashcat.  Personally I find hashcat far easier to use and understand.]]></description>
			<content:encoded><![CDATA[Was wondering if there were any plans or discussions to offer distributed computing for cpu hashcat? <br />
<br />
Not that I'm a programmer by any stretch of the imagination but can see this being a good alternative than rewriting Plus to support &gt;15 character passwords and still have somewhat ok speed -- depending on your number of cpus of course. <br />
<br />
I know there are other tools out there that can do this already but thought it would be a great addition to cpu hashcat.  Personally I find hashcat far easier to use and understand.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Linux & GPL]]></title>
			<link>https://hashcat.net/forum/thread-1893.html</link>
			<pubDate>Wed, 02 Jan 2013 16:32:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=1100">moujik</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1893.html</guid>
			<description><![CDATA[Please:<br />
<ol type="1" class="mycode_list"><li>remove MS Windows support from Hashcat;<br />
</li>
<li>change the Hashcat license to GNU GPLv3;<br />
</li>
<li>remove Hashcat binaries from the site;<br />
</li>
<li>release Hashcat only as a Linux source code package (maybe even on GitHub).<br />
</li>
</ol>
The argument is <a href="http://hashcat.net/forum/thread-1887.html" target="_blank" rel="noopener" class="mycode_url">that thread</a> <img src="https://hashcat.net/forum/images/smilies/biggrin.gif" alt="Big Grin" title="Big Grin" class="smilie smilie_4" />]]></description>
			<content:encoded><![CDATA[Please:<br />
<ol type="1" class="mycode_list"><li>remove MS Windows support from Hashcat;<br />
</li>
<li>change the Hashcat license to GNU GPLv3;<br />
</li>
<li>remove Hashcat binaries from the site;<br />
</li>
<li>release Hashcat only as a Linux source code package (maybe even on GitHub).<br />
</li>
</ol>
The argument is <a href="http://hashcat.net/forum/thread-1887.html" target="_blank" rel="noopener" class="mycode_url">that thread</a> <img src="https://hashcat.net/forum/images/smilies/biggrin.gif" alt="Big Grin" title="Big Grin" class="smilie smilie_4" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Adding HMAC-SHA256 to oclHashcat*]]></title>
			<link>https://hashcat.net/forum/thread-1892.html</link>
			<pubDate>Wed, 02 Jan 2013 15:26:24 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2512">Kuci</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1892.html</guid>
			<description><![CDATA[Hello, please, could you add support for HMAC-SHA256 (&#36;salt = key) to oclHashcat* ? I think, this algo is really popular nowadays mainly in CMSs and it'd be great to implement this algo into oclHashcat-plus and oclHashcat-lite.]]></description>
			<content:encoded><![CDATA[Hello, please, could you add support for HMAC-SHA256 (&#36;salt = key) to oclHashcat* ? I think, this algo is really popular nowadays mainly in CMSs and it'd be great to implement this algo into oclHashcat-plus and oclHashcat-lite.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[NTLMv2 Request]]></title>
			<link>https://hashcat.net/forum/thread-1849.html</link>
			<pubDate>Wed, 19 Dec 2012 12:20:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2485">Jimmy</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1849.html</guid>
			<description><![CDATA[Hi there,<br />
Greetings from Australia, saw your interview on Hak5 which brought me<br />
here, i was wondering whether you would be able to crack 4  NTLMv2 hashs for me?<br />
Thanks you]]></description>
			<content:encoded><![CDATA[Hi there,<br />
Greetings from Australia, saw your interview on Hak5 which brought me<br />
here, i was wondering whether you would be able to crack 4  NTLMv2 hashs for me?<br />
Thanks you]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[add MSCHAPV2 support]]></title>
			<link>https://hashcat.net/forum/thread-1846.html</link>
			<pubDate>Tue, 18 Dec 2012 23:58:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2482">thesle3p</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1846.html</guid>
			<description><![CDATA[MSCHAPV2 is a encrypted challenge response algorithm used extensively in Enterprise wireless networks and PPTP VPNS. Currently ASLEAP (a tool by josh wright) can crack them via wordlist or rainbow table and JTR can with some coaxing. also the cloudcracker cloud service can for a significant sum of money. what the penetration testing community needs is a tool that can crack MSCHAPV2 efficiently with support for CUDA and OpenCL. Hashcat would fit that knitch perfectly. I also would imagine that using existing crypto libraries it would be fairly easy to add MSCHAPV2 support to hashcat]]></description>
			<content:encoded><![CDATA[MSCHAPV2 is a encrypted challenge response algorithm used extensively in Enterprise wireless networks and PPTP VPNS. Currently ASLEAP (a tool by josh wright) can crack them via wordlist or rainbow table and JTR can with some coaxing. also the cloudcracker cloud service can for a significant sum of money. what the penetration testing community needs is a tool that can crack MSCHAPV2 efficiently with support for CUDA and OpenCL. Hashcat would fit that knitch perfectly. I also would imagine that using existing crypto libraries it would be fairly easy to add MSCHAPV2 support to hashcat]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[WPA MAC Privacy]]></title>
			<link>https://hashcat.net/forum/thread-1820.html</link>
			<pubDate>Sun, 09 Dec 2012 16:14:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=776">Hash-IT</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1820.html</guid>
			<description><![CDATA[I think quite a few people are worried about asking for help testing their WPA protected wifi networks because they are concerned about making the MAC address of the AP and client publicly available.<br />
<br />
I understand there is a way for people to find the physical location of the AP using Google or similar.<br />
<br />
I wonder if this request may help with this problem ?<br />
<br />
Atom, would it be possible for you to make a feature in hashcat-plus or a standalone tool to encrypt the .hccap file ?  The idea is this special new feature would allow the user to make their .hccap file as normal but then encrypt it using hashcat-plus so they can then freely distribute it publicly.<br />
<br />
People offering to help crack will also have the new version of hashcat-plus (with this feature).  They would accept the "secure.hccap" file, decrypt it (automatically and internally within hashcat-plus) and start work cracking it as normal.  The helpers have no knowledge of the password to open the .hccap file.<br />
<br />
Obviously the feature where the user can see the MAC would be obscured.  This way the person who captured the .hccap can feel able to distribute it knowing that people helping cannot ever see the MAC address's.  When the password is found only the password is displayed.<br />
<br />
The only problem I can think of is if someone could view what was happening in RAM and so see the MACs.  However I am not sure how that is possible with GPU RAM so I will hope someone more knowledgeable than me will answer that.<br />
<br />
I suppose a further enhancement to this would be that the ESSID is also hidden.<br />
<br />
I guess the encryption could be to a hashcat-plus GnuPG public key and the secret key would be within the hashcat-plus binary ?<br />
<br />
<br />
Thank you. <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" />]]></description>
			<content:encoded><![CDATA[I think quite a few people are worried about asking for help testing their WPA protected wifi networks because they are concerned about making the MAC address of the AP and client publicly available.<br />
<br />
I understand there is a way for people to find the physical location of the AP using Google or similar.<br />
<br />
I wonder if this request may help with this problem ?<br />
<br />
Atom, would it be possible for you to make a feature in hashcat-plus or a standalone tool to encrypt the .hccap file ?  The idea is this special new feature would allow the user to make their .hccap file as normal but then encrypt it using hashcat-plus so they can then freely distribute it publicly.<br />
<br />
People offering to help crack will also have the new version of hashcat-plus (with this feature).  They would accept the "secure.hccap" file, decrypt it (automatically and internally within hashcat-plus) and start work cracking it as normal.  The helpers have no knowledge of the password to open the .hccap file.<br />
<br />
Obviously the feature where the user can see the MAC would be obscured.  This way the person who captured the .hccap can feel able to distribute it knowing that people helping cannot ever see the MAC address's.  When the password is found only the password is displayed.<br />
<br />
The only problem I can think of is if someone could view what was happening in RAM and so see the MACs.  However I am not sure how that is possible with GPU RAM so I will hope someone more knowledgeable than me will answer that.<br />
<br />
I suppose a further enhancement to this would be that the ESSID is also hidden.<br />
<br />
I guess the encryption could be to a hashcat-plus GnuPG public key and the secret key would be within the hashcat-plus binary ?<br />
<br />
<br />
Thank you. <img src="https://hashcat.net/forum/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[New Algorithm md5(md5($salt).md5($pass))]]></title>
			<link>https://hashcat.net/forum/thread-1811.html</link>
			<pubDate>Thu, 06 Dec 2012 01:36:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://hashcat.net/forum/member.php?action=profile&uid=2439">alfonzo1955</a>]]></dc:creator>
			<guid isPermaLink="false">https://hashcat.net/forum/thread-1811.html</guid>
			<description><![CDATA[I would really like this for recovering MyBB and IPB hashes.]]></description>
			<content:encoded><![CDATA[I would really like this for recovering MyBB and IPB hashes.]]></content:encoded>
		</item>
	</channel>
</rss>