Cryptohaze Multiforcer Supported Hashes

From Cryptohaze Project Wiki
Jump to: navigation, search

Contents

Multiforcer Supported Hash Types

This is an overview of all currently supported hash types in the Cryptohaze Multiforcer. Unsalted and salted hash types are supported.

Unsalted Hash Types

MD5 - md5($pass)

The hash type "MD5" is for unsalted MD5 hashes. It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

DOUBLEMD5 - md5(md5($pass))

The hash type "DOUBLEMD5" is for unsalted double MD5 hashes. The inner MD5 is ASCII - not binary. This is the default for web languages like PHP. It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

TRIPLEMD5 - md5(md5(md5($pass)))

The hash type "TRIPLEMD5" is for unsalted triple MD5 hashes. The inner MD5s are ASCII - not binary. This is the default for web languages like PHP. It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

DUPMD5 - md5($pass.$pass)

The hash type "DUPMD5" is for unsalted MD5 hashes. It works by internally doubling the password before hashing it. This deals with people who feel "password" is a bad password, but "passwordpassword" is a great password because it's so long. Note that the lengths being cracked are doubled for the actual passwords (so working on a "length 7" password really is trying to crack a length 14 password composed of a length 7 password doubled). It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

MD5S - md5($pass)

The hash type "MD5S" is for a single, unsalted MD5 hash. It is substantially faster than the MD5 type for a single hash due to hash reversing, though not nearly so fast as Atom's work.

This hash type takes a plain hex input file (one hash only, 32 characters/16 bytes).

MD4 - md4($pass)

The hash type "MD4" is for unsalted MD4 hashes. It will work on unlimited numbers of hashes (within GPU memory limits). Note that MD4 is NOT the same as NTLM! For Windows hashes, use the NTLM type or LM type, depending on your password source.!

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

NTLM - md4(unicode($pass))

If you have hashes from a modern Windows machine, you probably want this. The hash type "NTLM" cracks the Windows NTLM hashes and works on an unlimited number (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

DUPNTLM - md4(unicode($pass.$pass))

The hash type "DUPNTLM" is for unsalted NTLM hashes. It works by internally doubling the password before hashing it. This deals with people who feel "password" is a bad password, but "passwordpassword" is a great password because it's so long. Note that the lengths being cracked are doubled for the actual passwords (so working on a "length 7" password really is trying to crack a length 14 password composed of a length 7 password doubled). It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

LM (Windows DES based hashing)

If you have hashes from an older Windows machine, you may want this. The hash type LM cracks the older Windows LanMan hashes and works on an unlimited number of hashes. When using this type, you should use "charsetMicrosoft" - this does not include any lowercase characters. As the LM hash type does not store lowercase characters, having them in the charset is a waste of time. Note that this hash type expects the full LM hash line - all 32 characters. You do NOT need to break the hashes into separate lines. It does this for you.

This hash type takes a plain hex input file (one full hash/two half hashes per line, 32 characters/16 bytes).

SHA1 - sha1($pass)

The hash type "SHA1" is for unsalted SHA1 hashes. It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 40 characters/20 bytes).

SHA - "{SHA}" . base64(sha1($pass))

The hash type "SHA" is for hashes of the {SHA} variety. The hashes will look like this: "{SHA}ESu3kTBHkd3PaS4p/VzxSbNf6jc=" It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes an input file with one SHA hash per line (including the "{SHA}" prefix).

MD5OFSHA1 - md5(sha1($pass))

The hash type "MD5OFSHA1" is for unsalted "MD5 of SHA1" hashes. The inner SHA1 is ASCII - not binary. This is the default for web languages like PHP. It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 32 characters/16 bytes).

SHA1OFMD5 - sha1(md5($pass))

The hash type "SHA1OFMD5" is for unsalted "SHA1 of MD5" hashes. The inner MD5 is ASCII - not binary. This is the default for web languages like PHP. It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 40 characters/20 bytes).

SHA256 - sha256($pass)

The hash type "SHA256" is for unsalted SHA256 hashes. It will work on unlimited numbers of hashes (within GPU memory limits).

This hash type takes a plain hex input file (one hash per line, 64 characters/32 bytes).

NOTE: SHA256 is in SVN ONLY right now! It should be out with the 1.31 release.

Salted Hash Types

SSHA - "{SSHA}" . base64(sha1($pass.$salt))

The hash type "SSHA" is for hashes of the {SSHA} variety. The hashes will look like this: "{SSHA}WOM5BLBDVNZvPf7gqtj92HrI2+5iOWI3NThjOQ=="

This hash type takes one "{SSHA}" hash per line.

MSSQL - "0x0100" . $salt . sha1($pass) . sha1(uppercase($pass))

The hash type "MSSQL" deals with older MSSQL hashes with the "0x0100" header. When using this hash type, use a charset that does not include lowercase letters - the attack tries against the uppercase hash, and then case corrects as needed. Use "charsetMicrosoft" - using lowercase characters in the charset is just wasting time! The hashes will look like this: "0x0100101EC5882725E42CBB5AEBC97384134E6DB60B5C7DFC4B773C8F80BE60D803A05840EDFC0ED231BB60EBCA8B"

This hash type takes one MSSQL hash per line.

MD5_PS - md5($pass.$salt)

The hash type "MD5_PS" is for salted hashes of the "password, then salt" variety.

I honestly forget what the file format is, so I'll fill this out later.

MD5_SP - md5($salt.$pass)

The hash type "MD5_SP" is for salted hashes of the "salt, then password" variety.

I honestly forget what the file format is, so I'll fill this out later.

Personal tools
Namespaces
Variants
Actions
Navigation
Toolbox