Poll: Do you find Hashtopus interesting?
You do not have permission to vote in this poll.
Yes, I would use it
94.62%
88 94.62%
No, it's a shitty idea
5.38%
5 5.38%
Total 93 vote(s) 100%
* You voted for this item. [Show Results]

Hashtopus - distributed solution
How can i use command ih hastopus
-i --increment-min=7 --increment-max=9 -1 ?l?u?d

I think? for hastopus need frandly web form, for exemple e.t. www.qssr.ru
(04-24-2015, 08:22 PM)qssr Wrote: How can i use command ih hastopus
-i --increment-min=7 --increment-max=9 -1 ?l?u?d

I think? for hastopus need frandly web form, for exemple e.t. www.qssr.ru

Dude... at least PRETEND you've read the manual. You can't just go to the forum and have the local folk solve all your problems.

The -i parameter is not allowed when using -s and -l with oclHashcat, which is limitation of oclHashcat itself
(04-23-2015, 07:25 PM)curlyboi Wrote:
(04-22-2015, 06:30 PM)magere-hein Wrote: Hi, I think I found a bug in hashtopus.

you need to use only 6fb6eac4a195e3643b735c1b177d263dd2041b​90478c7dc5:b412549e207​​a01d2 and check salted hash

I deleted the "user@domain.com:::: " and uploaded 6fb6eac4a195e3643b735c1b177d263dd2041b​90478c7dc5:b412549e207​​a01d2 to a new hashlist with hashcode 5500 and checked salted hash. I created a new task and distributed it to one of my cliënt but now I get a different error saying no hashes loaded.
Output is:
Benchmarking task for 10s...ERROR -1Hashcat process error: ERROR: No hashes loaded

If If check the hashlist I see the following: 6fb6eac4a195e3643b735c1b177d263dd2041b​90478c7dc5:b412549e207​​a01d2:
The attack command that I use is: -a 3 #HL# -1 ?d?l ?1?1?1?1?1?1?1?1 --gpu-temp-disable

Hope you can help.


Kind regards M-H
You can not remove that part of the hash, it's required. Just make sure to not use -i within a hashtopus session because this is not supported by hashcat.

However, it's a multiple-salt hash. There's a good chance hashtopus gets confused by this.
Oh! In that case, you need to use uncheck "salted hashes" and definitely upgrade to newest version because the old 0.8.5 had too small db columns for hashes, this one looks longer than the old limit.

You can verify this by letting the agent download the hashlist, then examinig the hashlist file on the agent side, if the hash is there full.
Ok I will upgrade to the newest version.

Mayby it's just a stupid question but how do I upgrade my version of hashtopus?
Just download the zip file and overwrite everything in my folder? Or do I have to make a new database?


Kind regards,
M-H
Just made a new database to keep it simple and updated to the latest version. 0.9.2
I uploaded this hash into a new hashlist: user@domain.com::::6fb6eac4a195e3643b735c1b177d263dd2041b​90478c7dc5:b412549e207​​a01d2
didn't check the salted hash

made a task in the following format -a 3 #HL# -1 ?d?l ?1?1?1?1?1?1?1?1 --gpu-temp-disable
and let it run.
I already know the password for this one so I made it easier Smile and I can confirm that it works.


Thx for the help Smile.


Kind Regards
M-H
hello!
when i am trying to do "-a 0 -m 2500 #HL# dictionary" in hashtopus, and the dictionary has the password, it shows me in debug mode that it finds the password but then skip it ?
but when i try with the example0 and 500 hash files that come with hashcat, it works fine. i also tried with cudaHascat locally on my machine also works fine. i also tried bruteforce with just the password.
so i am wondering why it doesnt register the passwords when its WPA2 hashes ?

here's some output from the debug (slightly censured):

XXXXXXXX:XXXXXXX:XXXXXXXX8c55ea48cb
STATUS 5 SPEED 0 0.922125 CURKU 0 PROGRESS 61 61 RECHASH 1 1 RECSALT 1 1 TEMP 32
[61/61] Uploading 51 b.Hashcat subprocess finished at 21:57:40 (1s)
..Cracked 0, skipped 1
(04-30-2015, 05:16 AM)xoxox Wrote: hello!
when i am trying to do "-a 0 -m 2500 #HL# dictionary" in hashtopus, and the dictionary has the password, it shows me in debug mode that it finds the password but then skip it ?
but when i try with the example0 and 500 hash files that come with hashcat, it works fine. i also tried with cudaHascat locally on my machine also works fine. i also tried bruteforce with just the password.
so i am wondering why it doesnt register the passwords when its WPA2 hashes ?

here's some output from the debug (slightly censured):

XXXXXXXX:XXXXXXX:XXXXXXXX8c55ea48cb
STATUS 5 SPEED 0 0.922125 CURKU 0 PROGRESS 61 61 RECHASH 1 1 RECSALT 1 1 TEMP 32
[61/61] Uploading 51 b.Hashcat subprocess finished at 21:57:40 (1s)
..Cracked 0, skipped 1

When you create new task in hashtopus, there is a little help under the command line field:
...Also, don't use any of these parameters, they will be invoked automatically:
hash-type, limit, outfile-check-dir, outfile-check-timer, potfile-disable, remove,
remove-timer, separator, session, skip, status, status-timer...
(04-30-2015, 09:08 AM)bitguard Wrote:
(04-30-2015, 05:16 AM)xoxox Wrote: hello!
when i am trying to do "-a 0 -m 2500 #HL# dictionary" in hashtopus, and the dictionary has the password, it shows me in debug mode that it finds the password but then skip it ?
but when i try with the example0 and 500 hash files that come with hashcat, it works fine. i also tried with cudaHascat locally on my machine also works fine. i also tried bruteforce with just the password.
so i am wondering why it doesnt register the passwords when its WPA2 hashes ?

here's some output from the debug (slightly censured):

XXXXXXXX:XXXXXXX:XXXXXXXX8c55ea48cb
STATUS 5 SPEED 0 0.922125 CURKU 0 PROGRESS 61 61 RECHASH 1 1 RECSALT 1 1 TEMP 32
[61/61] Uploading 51 b.Hashcat subprocess finished at 21:57:40 (1s)
..Cracked 0, skipped 1

When you create new task in hashtopus, there is a little help under the command line field:
...Also, don't use any of these parameters, they will be invoked automatically:
hash-type, limit, outfile-check-dir, outfile-check-timer, potfile-disable, remove,
remove-timer, separator, session, skip, status, status-timer...

Sure but still when i put the hash type in the other tests it works, and with or without it doesnt work with the WPA, still skips and doesnt log the password