atom





Administrator Posts: 5,075

Threads: 226

Joined: Apr 2010 #1

Download here:





oclHashcat v1.00 is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15



The reason for fusion was:

Simplify the project! Users were confused which tool among -lite and -plus they should choose.



Fusioned oclHashcat will automatically decide which kernel type to choose based on the attack-mode and the hash-type you selected



Save maintaining two programs with nearly the same codebase



Save disk-space and packages



This release is alot about performance and bugs



While -plus v0.15 focused on supporting password candidates with length 15+, which in some cases reduced cracking speed, we can say that with oclHashcat v1.00 most of the speed loss that inevitabely was introduced with -plus v0.15 got compensated for many hash types by heavily optimizing the new kernels (e.g. merging -plus kernels with -lite and continuing optimizing the resulting kernel). You will see some nice increase of cracking speed for some hash-types (e.g. raw MD5 on NVidia from ~1600MH/s -> 1800MH/s), see benchmarking section.



We've also written an fully automated testing system, cross-platform. We found some bugs which were all fixed. If you want to try it on your system just come to IRC and we'll instruct you how to run it.





Workaround driver problems



Whenever AMD or NVidia releases new drivers we have to check if our code still works. Most of the time it just works, but sometimes they add bugs to their driver that influences (or heavily influences) oclHashcat.



One example was the Catalyst 13.8beta driver, which is known to have some bugs that influence oclHashcat. We had to mark it as "broken" and were printing out a warning message whenever a user wanted to run -lite or -plus using this driver.



That was a very restrictive way of handling that type of problem and made package maintainers mad. This behavior forced the distribution to stick to a specific driver version. So we decided to find out where the bugs in the drivers are and then try to workaround them.



That done, we worked around all (known) bugs so you will be able to use all drivers from Catalyst 13.4 and upwards.





Built-in benchmarking system



While this feature was in -lite for some time, it's new for -plus users. This "tool" will show you which maximum performance you can get out of your system in an ideal cracking case. Such a case is usually trying to crack a single hash using the brute-force attack mode, because we can make use of a lot of different optimization techniques.



It has been fine-tuned to use near-to-perfect tuned workloads (-n and -u parameters) and it is using a huge keyspace. Whenever you run an attack there are many factors that can influence cracking speed. By using the benchmark system you can get an idea what your maximum possible cracking speed could be and optimize your attack.



Most of the basic commandline parameters can be used in addition, for example you can use -d to select which GPU(s) or card(s) to run in benchmark mode. Or, if you want to benchmark just a single hash type you can use the -m parameter.



There are two different benchmark-modes. The default sets the configuration to run in benchmark-mode 1, which is the more aggressive one. It's what most people will use and thats it. If you switch to benchmark-mode 0 you can manually tune -n and -u value to even more aggressive values but make sure you have good GPU cooling.



It's also a very simple way to benchmark your system and compare it with others. To have some fun after downloading oclHashcat v1.00 just run it with e.g. "./oclHashcat64.bin -b", that's it.





Multi-hccap support



Starting with this release, oclHashcat supports .hccap files for WPA cracking that include several networks (both with different or same ESSID). The file format is basically using the same struct as before, but one .hccap file can now consist of several such structures.



This implies that you could simply merge two or more .hccap files together into a new .hccap file that contains all of the merged information. A simple "cat 1st.hccap 2nd.hccap > all.hccap" should suffice to get you started with this new feature (on windows use an equivalent command).





Support for new algorithms

HMAC-* (key = $pass)



HMAC-* (key = $salt)



sha1(LinkedIn)



Kerberos 5 AS-REQ Pre-Auth etype 23

* = MD5, SHA1, SHA256, SHA512





Full changelog



Quote:

* initial version 1.00



first public release, oclHashcat is a fusion of oclHashcat-plus v0.15 and oclHashcat-lite v0.15



type: driver

file: kernels

desc: added support for AMD Catalyst v13.8b*



type: driver

file: kernels

desc: added support for AMD Catalyst v13.9



type: driver

file: kernels

desc: added support for AMD Catalyst v13.11b*



type: driver

file: kernels

desc: added support for AMD R9 series



type: driver

file: kernels

desc: added support for AMD APP SDK v2.9



type: feature

file: kernels

desc: added -m 50 = HMAC-MD5 (key = $pass)



type: feature

file: kernels

desc: added -m 60 = HMAC-MD5 (key = $salt)



type: feature

file: kernels

desc: added -m 150 = HMAC-SHA1 (key = $pass)



type: feature

file: kernels

desc: added -m 160 = HMAC-SHA1 (key = $salt)



type: feature

file: kernels

desc: added -m 190 = sha1(LinkedIn)

trac: #190



type: feature

file: kernels

desc: added -m 1450 = HMAC-SHA256 (key = $pass)

trac: #97



type: feature

file: kernels

desc: added -m 1460 = HMAC-SHA256 (key = $salt)

trac: #97



type: feature

file: kernels

desc: added -m 1750 = HMAC-SHA512 (key = $pass)



type: feature

file: kernels

desc: added -m 1760 = HMAC-SHA512 (key = $salt)



type: feature

file: kernels

desc: added -m 7500 = Kerberos 5 AS-REQ Pre-Auth etype 23



type: feature

file: host programs

desc: added tab completion feature for bash in extra folder



type: feature

file: host programs

desc: added support for Tesla Deployment Kit v5.319.43



type: feature

file: host programs

desc: added support for NVAPI R319



type: feature

file: host programs

desc: added --benchmark, run several hash modes in benchmark mode for speed tests



type: feature

file: host programs

desc: added --disable-restore option, don't write/update nor touch restore file



type: feature

file: host programs

desc: added --cleanup-rules, remove rules that couldn't be used or have duplicates. A .bak backup file will be created

trac: #139



type: feature

file: host programs

desc: added support for hccap files containing several networks

trac: #167



type: feature

file: host programs

desc: show the status by hitting the s key or the Enter key, show the status when dict or mask changed

trac: #189



type: feature

file: host programs

desc: show line progress for maskfiles (.hcmask)

trac: #206



type: rules

file: T0XlC.rule

desc: cleaned, original T0XlC.rule

cred: T0XlC



type: rules

file: T0XlCv1.rule

desc: added ruleset with 12000 random rules

cred: T0XlC



type: rules

file: T0XlC_insert_00-99_1950-2050_toprules_0_F.rule

desc: added ruleset with insert rules from position 0 to position F (00-99,1950-2050)

cred: T0XlC



type: rules

file: T0XlC_insert_space_and_special_0_F.rule

desc: added ruleset with insert rules from position 0 to position F (special characters)

cred: T0XlC



type: rules

file: T0XlC_insert_top_100_passwords_1_G.rule

desc: added ruleset with insert rules from position 0 to position F (top 100 passwords)

cred: T0XlC



type: bug

file: host programs

desc: problem while performing the --remove operation in windows fixed - timing problem (Permission denied error)



type: bug

file: host programs

desc: Fixed mask length display in status screen when using hash types that internally use unicode



type: bug

file: host programs

desc: Hash files that did not end with a newline character were not parsed correctly



type: bug

file: host programs

desc: Fixed crash when hitting CTRL-C, when receiving abort signals



type: bug

file: host programs

desc: Fixed freeze, flush problem w/ progress at ~100%

trac: #82



type: bug

file: host programs

desc: Fixed russian charset files (hcchr), removed unnecessary chars

trac: #194



type: bug

file: host programs

desc: Fixes a crash when using --username together with --remove

trac: #197



type: change

file: host programs

desc: new default status-timer value is 10 seconds instead of 1 minute

Download here: http://hashcat.net/oclhashcat/ The reason for fusion was:While -plus v0.15 focused on supporting password candidates with length 15+, which in some cases reduced cracking speed, we can say that with oclHashcat v1.00 most of the speed loss that inevitabely was introduced with -plus v0.15 got compensated for many hash types by heavily optimizing the new kernels (e.g. merging -plus kernels with -lite and continuing optimizing the resulting kernel). You will see some nice increase of cracking speed for some hash-types (e.g. raw MD5 on NVidia from ~1600MH/s -> 1800MH/s), see benchmarking section.We've also written an fully automated testing system, cross-platform. We found some bugs which were all fixed. If you want to try it on your system just come to IRC and we'll instruct you how to run it.Whenever AMD or NVidia releases new drivers we have to check if our code still works. Most of the time it just works, but sometimes they add bugs to their driver that influences (or heavily influences) oclHashcat.One example was the Catalyst 13.8beta driver, which is known to have some bugs that influence oclHashcat. We had to mark it as "broken" and were printing out a warning message whenever a user wanted to run -lite or -plus using this driver.That was a very restrictive way of handling that type of problem and made package maintainers mad. This behavior forced the distribution to stick to a specific driver version. So we decided to find out where the bugs in the drivers are and then try to workaround them.That done, we worked around all (known) bugs so you will be able to use all drivers from Catalyst 13.4 and upwards.While this feature was in -lite for some time, it's new for -plus users. This "tool" will show you which maximum performance you can get out of your system in an ideal cracking case. Such a case is usually trying to crack a single hash using the brute-force attack mode, because we can make use of a lot of different optimization techniques.It has been fine-tuned to use near-to-perfect tuned workloads (-n and -u parameters) and it is using a huge keyspace. Whenever you run an attack there are many factors that can influence cracking speed. By using the benchmark system you can get an idea what your maximum possible cracking speed could be and optimize your attack.Most of the basic commandline parameters can be used in addition, for example you can use -d to select which GPU(s) or card(s) to run in benchmark mode. Or, if you want to benchmark just a single hash type you can use the -m parameter.There are two different benchmark-modes. The default sets the configuration to run in benchmark-mode 1, which is the more aggressive one. It's what most people will use and thats it. If you switch to benchmark-mode 0 you can manually tune -n and -u value to even more aggressive values but make sure you have good GPU cooling.It's also a very simple way to benchmark your system and compare it with others. To have some fun after downloading oclHashcat v1.00 just run it with e.g. "./oclHashcat64.bin -b", that's it.Starting with this release, oclHashcat supports .hccap files for WPA cracking that include several networks (both with different or same ESSID). The file format is basically using the same struct as before, but one .hccap file can now consist of several such structures.This implies that you could simply merge two or more .hccap files together into a new .hccap file that contains all of the merged information. A simple "cat 1st.hccap 2nd.hccap > all.hccap" should suffice to get you started with this new feature (on windows use an equivalent command).* = MD5, SHA1, SHA256, SHA512 Website Find eljolot





Member Posts: 88

Threads: 16

Joined: Nov 2012 #2 let's try Awesomelet's try Find skalderis





Junior Member Posts: 45

Threads: 12

Joined: Aug 2011 #3 Another anticipated great release! Find SageRydaer





Junior Member Posts: 2

Threads: 0

Joined: Dec 2013 #4 Hey there, i downloaded the file, but whenever i try to open it, it tells me that there are no files within it or it's corrupted. Why's this happenening?



-Thanks Find K9





Super Moderator Posts: 123

Threads: 12

Joined: Apr 2010 #5 Good job. Find Kuci





Member Posts: 179

Threads: 13

Joined: Dec 2012 #6 Great ! Find chancas





Junior Member Posts: 3

Threads: 1

Joined: May 2012 #7 Thanks. Good job. Find eljolot





Member Posts: 88

Threads: 16

Joined: Nov 2012 #8

(12-07-2013, 08:21 AM) SageRydaer Wrote: Hey there, i downloaded the file, but whenever i try to open it, it tells me that there are no files within it or it's corrupted. Why's this happenening?



-Thanks Use 7Zip, I had the same problem, maybe is a new version. Tried to open with my old winrar. Then I downloaded the new version of 7zip Find Hash-IT





Moderator Posts: 723

Threads: 85

Joined: Apr 2011 #9 Thank you very much atom for all your hard work. Find atom





Administrator Posts: 5,075

Threads: 226

Joined: Apr 2010 #10 thank you, but you guys should thank philsmd as well Website Find