New-Multiforcer question

Problems with the hash cracking system? Suggestions?
  • Ads

Re: New-Multiforcer question

Postby HelloShitty » Sat Jul 28, 2012 6:29 am

Bitweasil wrote:
HelloShitty wrote:Won't it has anything to do with \new line char?

After starting a new job with no --resumefile there's no chance of resuming a job, right?


I don't know what the problem is.

And the resume support is flat out not working right now.

It's still not even really a beta...


Hi Bitweasil.

Thanks for replying.

If you wish, we can turn this thread into a bug list/beta tester thread.

I don't know what you meant back there when you said "I probably will not have time to code it up until after Defcon."

I hope that you can spend some time with New-Multiforcer as soon as it can be for you...
Any help you might need, please ask me... I'll do my best to help you out...

Cheers
HelloShitty
 
Posts: 6
Joined: Thu Jul 26, 2012 2:50 pm

Re: New-Multiforcer question

Postby Bitweasil » Sat Jul 28, 2012 8:23 am

HelloShitty wrote:If you wish, we can turn this thread into a bug list/beta tester thread.


There is a bug tracker on Sourceforge that can be used for bugs. http://sourceforge.net/tracker/?group_i ... id=2066578

I don't know what you meant back there when you said "I probably will not have time to code it up until after Defcon."


I am speaking at the Defcon security conference in Las Vegas this weekend. I'm quite busy preparing for that.

I hope that you can spend some time with New-Multiforcer as soon as it can be for you...
Any help you might need, please ask me... I'll do my best to help you out...


I work on it as a hobby project. I will get to the per position charset bug and the salt:pass format next week, and the resume support will happen when I have time. I owe other people significant amounts of time in exchange for having prepared for the conference as long as I did. :)

Otherwise, the source is available, and I do enjoy receiving patches.
Bitweasil
Site Admin
 
Posts: 912
Joined: Tue Jan 20, 2009 4:26 pm

Re: New-Multiforcer question

Postby HelloShitty » Sat Jul 28, 2012 7:18 pm

Bitweasil wrote:
HelloShitty wrote:If you wish, we can turn this thread into a bug list/beta tester thread.


There is a bug tracker on Sourceforge that can be used for bugs. http://sourceforge.net/tracker/?group_i ... id=2066578

I don't know what you meant back there when you said "I probably will not have time to code it up until after Defcon."


I am speaking at the Defcon security conference in Las Vegas this weekend. I'm quite busy preparing for that.

I hope that you can spend some time with New-Multiforcer as soon as it can be for you...
Any help you might need, please ask me... I'll do my best to help you out...


I work on it as a hobby project. I will get to the per position charset bug and the salt:pass format next week, and the resume support will happen when I have time. I owe other people significant amounts of time in exchange for having prepared for the conference as long as I did. :)

Otherwise, the source is available, and I do enjoy receiving patches.


Well i understand now everything...

I'm new to this matter of hash cracking and so. But i'm learning.

About making patches, i have no knowledge in programming but i would to have. I'll start this year learning C in my graduation but i don't know if it would be enough to build patches or so...

Anyway... Thanks for any help and any time you spend on New-Multiforcer...


Edited;

Can you tell me if i can post this "Terminating due to error: Charset does not extend to password length 9!" error in that link that you gave me about bugs? If i can, how do i do it?




Edited1;

New error found. Don't know if it is a bug or something that i've done wrong

charset

Code: Select all
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_-+=
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_-+=
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_-+=
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_-+=
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_-+=
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_-+=
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()_-+=


Tested passwd:

Code: Select all
!craAckK


command used

Code: Select all
/New-Multiforcer -h LM -u charset1.chst -f hash.hsh -o passwd.pw --nocpu


Output error:

CHHashFileVPlainLM::OpenHashFile(hash.hsh)
CHHashFileVPlainLM::SortHashes()
Cannot add devices!


Note: please check the attachment out to see the error layout
Attachments
Desktop-Downloads-New-Multiforcer-Linux.png
Desktop-Downloads-New-Multiforcer-Linux.png (235.4 KiB) Viewed 10378 times
HelloShitty
 
Posts: 6
Joined: Thu Jul 26, 2012 2:50 pm

Re: New-Multiforcer question

Postby Bitweasil » Sat Jul 28, 2012 11:51 pm

HelloShitty wrote:Can you tell me if i can post this "Terminating due to error: Charset does not extend to password length 9!" error in that link that you gave me about bugs? If i can, how do i do it?


No, it's because you are using a per-position charset with only 8 lines. There must be one line per position for the "-u" option. And since you have 8 lines, you cannot run length 9.

Output error:

CHHashFileVPlainLM::OpenHashFile(hash.hsh)
CHHashFileVPlainLM::SortHashes()
Cannot add devices!


Note: please check the attachment out to see the error layout


You're specifying a device that doesn't exist, or running without devices. The device management is really bad right now, and is on the list to improve.
Bitweasil
Site Admin
 
Posts: 912
Joined: Tue Jan 20, 2009 4:26 pm

Re: New-Multiforcer question

Postby frede.sch » Mon Jul 30, 2012 9:27 pm

Bitweasil wrote:Is it hash($pass.$salt) or hash($salt.$pass)?

The 10 character limit has been pushed up in in SVN. Should be 31 for MD5.

And you can definitely use a salt kernel, but right now I only have $pass.$salt - I can get the other written if you need it.

A few more details & an example hash would be very useful.


31 characters for MD5? That's too much! How did you get that? 128 bit variables?
frede.sch
 
Posts: 7
Joined: Fri Jun 01, 2012 12:45 am

Re: New-Multiforcer question

Postby Bitweasil » Tue Jul 31, 2012 2:06 am

frede.sch wrote:31 characters for MD5? That's too much! How did you get that? 128 bit variables?


It's for use with the per position charset stuff. You obviously can't actually brute force that with the full character set.

It supports up to 55 or so for some of the kernels. Just can't recall which ones are limited and which aren't.
Bitweasil
Site Admin
 
Posts: 912
Joined: Tue Jan 20, 2009 4:26 pm

Previous

Return to Hash cracking

Who is online

Users browsing this forum: No registered users and 1 guest

cron