mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#hashcat

2 Beiträge2 Beteiligte0 Beiträge heute
Cyclone<p>"As CMIYC isn't running at DEFCON this year, Password Village has worked with In.security to bring Jabbercracky to DEFCON to fill the void this year!</p><p>This will be a 48-hour event running from 12:00 noon on Friday 8th - 12:00 noon on Sunday 10th August."</p><p><a href="https://forum.hashpwn.net/post/793" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forum.hashpwn.net/post/793</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cmiyc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cmiyc</span></a> <a href="https://infosec.exchange/tags/KoreLogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KoreLogic</span></a> <a href="https://infosec.exchange/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://infosec.exchange/tags/jabbercracky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jabbercracky</span></a> <a href="https://infosec.exchange/tags/insecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>insecurity</span></a> <a href="https://infosec.exchange/tags/PasswordVillage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordVillage</span></a> <a href="https://infosec.exchange/tags/hashpwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashpwn</span></a> <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> <a href="https://infosec.exchange/tags/hashmob" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashmob</span></a> <a href="https://infosec.exchange/tags/hashcracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcracking</span></a> <a href="https://infosec.exchange/tags/contest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>contest</span></a></p>
Royce Williams<p>Coming in the next hashcat release, merged today: max custom charsets for masks has been bumped from 4 to 8 (a pending PR from the late Flagg - RIP)</p><p><a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Royce Williams<p>Available in hashcat's latest GitHub main branch, and coming soon in the next hashcat release ... a couple of nice-to-haves that improve quality of life for power users.</p><p>By me (password min and max in status output):</p><pre><code>Kernel.Feature...: Pure Kernel (password length 0-256 bytes)<br></code></pre><p>[...]</p><pre><code>Kernel.Feature...: Optimized Kernel (password length 0-55 bytes)<br></code></pre><p>By chick3nman (at my request, true keyspace instead of hashcat's workload-related "keyspace"):</p><pre><code>$ hashcat -a 3 \<br>--total-candidates \<br>?a?a?a?a?a?a?a <br><br>69833729609375<br></code></pre><p>By matrix (platform back-end info (<code>-I</code>) now has a machine-readable option, at my request, JSON):</p><pre><code>$ hashcat -I --machine-readable \<br>| jq '.OpenCLInfo.Platforms[].BackendDevices[].Name'<br><br>"AMD EPYC 7642 48-Core Processor"<br>"NVIDIA GeForce RTX 4090"<br>"NVIDIA GeForce RTX 4090"<br></code></pre><p><a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Hashcat supports over 300 optimized hashing algorithms and runs on CPUs, GPUs, and accelerators across Linux, Windows, and macOS. Five attack modes make it a versatile password recovery tool. <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> <a href="https://infosec.exchange/tags/passwordsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordsecurity</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/hashcat/hashcat" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/hashcat/hashcat</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Martin Boller :debian: :tux: :freebsd: :windows: :mastodon:<p>70000 | argon2id [Bridged: reference implementation + tunings] | Raw Hash</p><p><a href="https://infosec.exchange/tags/argon2id" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>argon2id</span></a> <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Royce Williams<p>hashcat's latest pre-release (GitHub bleeding edge, or hashcat.net/beta) now has ...</p><p><strong>Argon2 support!</strong> 🎉 </p><p><a href="https://github.com/hashcat/hashcat/commit/96e3b6581df894b77722ac9c048519444bacd901" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/hashcat/hashcat/com</span><span class="invisible">mit/96e3b6581df894b77722ac9c048519444bacd901</span></a></p><p><a href="https://github.com/hashcat/hashcat/commit/d9918d7e44020a526aa7bdc0e364f9c159a0c324" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/hashcat/hashcat/com</span><span class="invisible">mit/d9918d7e44020a526aa7bdc0e364f9c159a0c324</span></a></p><p>Read the commit comments for more on the interesting architectural enhancements involved.</p><p>Benchmarks:</p><p>NVIDIA Driver Version: 575.51.03<br>CUDA Version: 12.9 </p><pre><code>$ hashcat --version<br>v6.2.6-1075-gd9918d7e4<br></code></pre><p>GPU (2x 4090s), CUDA 3.0:</p><pre><code>$ hashcat -b -m 34000<br>[...]<br>* Hash-Mode 34000 (Argon2) [Iterations: 12]<br>[...]<br>Speed.#01........: 1720 H/s (104.11ms) @ Accel:360 Loops:6 Thr:32 Vec:1<br>Speed.#02........: 1718 H/s (104.28ms) @ Accel:360 Loops:6 Thr:32 Vec:1<br>Speed.#*.........: 3438 H/s<br></code></pre><p>Same GPUs, OpenCL:</p><pre><code>$ hashcat -b -m 34000 --backend-ignore-cuda<br>[...]<br><br>Speed.#02........: 1724 H/s (104.21ms) @ Accel:360 Loops:6 Thr:32 Vec:1<br>Speed.#03........: 1721 H/s (104.38ms) @ Accel:360 Loops:6 Thr:32 Vec:1<br>Speed.#*.........: 3445 H/s<br></code></pre><p>CPU (EPYC 7642 48C/96T 2.3GHz, Intel OpenCL 2.1 (Linux)) :</p><pre><code>$ hashcat -b -D 1 -m 34000<br>[...]<br>Speed.#03........: 38 H/s (629.80ms) @ Accel:96 Loops:3 Thr:32 Vec:8<br></code></pre><p>Apple Metal (368.12, M2):</p><pre><code>$ hashcat -b -m 34000 --backend-ignore-opencl<br>[...]<br>Speed.#01........: 28 H/s (86.57ms) @ Accel:10 Loops:3 Thr:32 Vec:1<br></code></pre><p>And high praise from atom for the PR:<br><a href="https://github.com/hashcat/hashcat/pull/4284" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/hashcat/hashcat/pul</span><span class="invisible">l/4284</span></a></p><blockquote><p>This is an amazing contribution.</p><p>100 Stars from my side for this.</p><p>Many thanks to Pelle &amp; Ewald from the NFI and thanks to Ondrej Mosnáček for creating the original warp-based GPU implementation!!</p></blockquote><p><a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> <a href="https://infosec.exchange/tags/argon2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>argon2</span></a></p>
nickbearded<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tychotithonus" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tychotithonus</span></a></span> No official publication yet, just internal tests, same hardware, CPU only (OpenCL via POCL). But feel free to try it yourself, that’s the beauty of BashCore: transparent, reproducible and lean by design 🤗</p><p>We welcome independent benchmarks 🔥</p><p><a href="https://mastodon.social/tags/bashcore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bashcore</span></a> <a href="https://mastodon.social/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> <a href="https://mastodon.social/tags/benchmark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>benchmark</span></a> <a href="https://mastodon.social/tags/cpucracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cpucracking</span></a></p>
nickbearded<p>🚨 BashCoreT beats Kali Linux in hashcat benchmarks! 💥</p><p>Out of 26 hash modes:<br>🥇 BashCoreT wins 16<br>🥈 Kali wins 10</p><p>Highlights: WPA, NTLMv2, DPAPI, Kerberos, KeePass, RAR5, Bitcoin…</p><p>Same hardware, same OpenCL, but BashCoreT runs a real-time kernel (Debian Trixie + 6.12 RT).</p><p>⚡ Less bloat. More power.<br>🧠 Minimalism wins.</p><p><a href="https://bashcore.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bashcore.org</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashcat</span></a> <a href="https://mastodon.social/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KaliLinux</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Minimalism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Minimalism</span></a> <a href="https://mastodon.social/tags/LiveOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LiveOS</span></a></p>
Will Hunt<p>Following my Security Fest talk yesterday I've released Hashcatalyst, a wrapper that helps automate non-distributed workflows by chaining multiple attacks with no downtime.</p><p><a href="https://github.com/stealthsploit/Hashcatalyst" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/stealthsploit/Hashc</span><span class="invisible">atalyst</span></a></p><p><a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Royce Williams<p>Well, this cracking attack is going to take 5.5 days on 2x 4090s.</p><p><a href="https://infosec.exchange/tags/PasswordCracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordCracking</span></a> <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Cyberkid<p>🐈‍⬛ Hashcat – A Practical Guide to Password Auditing</p><p>Hashcat is a powerful GPU-accelerated password recovery tool used by security professionals to test the strength of passwords in authorized environments.</p><p>🧠 What Hashcat is used for:<br>• Auditing password hashes (e.g., from Windows, Linux, web apps)<br>• Testing password policies and complexity<br>• Identifying weak or reused credentials in simulated lab setups</p><p>🔐 Key Features:<br>• Supports a wide variety of hash types (MD5, SHA1, NTLM, bcrypt, etc.)<br>• Multiple attack modes: dictionary, brute-force, mask, hybrid, rule-based<br>• Highly customizable and efficient with GPU acceleration<br>• Works well for red teamers and defenders validating password hygiene</p><p>🎯 When to use it:<br>• During penetration tests (with permission)<br>• In password policy assessments<br>• For internal security audits and training exercises</p><p>Disclaimer: This guide is for educational and ethical use only. Only audit password hashes on systems you own or have explicit authorization to test.</p><p><a href="https://defcon.social/tags/Hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashcat</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/PasswordAuditing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordAuditing</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/EducationOnly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EducationOnly</span></a> <a href="https://defcon.social/tags/RedTeamTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeamTools</span></a> <a href="https://defcon.social/tags/CredentialSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CredentialSecurity</span></a> <a href="https://defcon.social/tags/GPUCracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPUCracking</span></a> <a href="https://defcon.social/tags/SecurityAssessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAssessment</span></a></p>
Will Hunt<p>Top <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> tip:</p><p>Want per-position duplication in your rules to leverage your GPU?</p><p>It's not available in a single op, but you can emulate it by incrementally duplicating the first N chars, and then incrementally deleting the position and frequency of the redundant characters</p><p><a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>password</span></a> <a href="https://infosec.exchange/tags/passwordcracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordcracking</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a></p>
Cyclone<p>New version of <a href="https://infosec.exchange/tags/hashgen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashgen</span></a> published.</p><p>Changelog:<br>v1.1.0; 2025-03-19<br>added modes: <a href="https://infosec.exchange/tags/base58" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>base58</span></a>, <a href="https://infosec.exchange/tags/argon2id" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>argon2id</span></a>, <a href="https://infosec.exchange/tags/bcrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bcrypt</span></a> w/custom cost factor</p><p><a href="https://forum.hashpwn.net/post/89" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forum.hashpwn.net/post/89</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/hashgenerator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashgenerator</span></a> <a href="https://infosec.exchange/tags/hashcracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcracking</span></a> <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> <a href="https://infosec.exchange/tags/hashpwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashpwn</span></a> <a href="https://infosec.exchange/tags/cyclone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyclone</span></a> <a href="https://infosec.exchange/tags/golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>golang</span></a></p>
Cyclone<p>After seeing yescrypt hashes appear in CMIYC a while back, I started developing a yescrypt cracker in pure Go. Since then, yescrypt has become the default /etc/shadow hash for many popular linux distros such as Debian, Ubuntu, RHEL, Fedora, and Arch (to name a few), but hash cracking support for this algo has been limited to JtR -- until now.</p><p>Here's a sneak peek of the yescrypt_cracker POC: </p><p><a href="https://forum.hashpwn.net/post/446" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forum.hashpwn.net/post/446</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/yescrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yescrypt</span></a> <a href="https://infosec.exchange/tags/hashcracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcracking</span></a> <a href="https://infosec.exchange/tags/cyclone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyclone</span></a> <a href="https://infosec.exchange/tags/hashpwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashpwn</span></a> <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> <a href="https://infosec.exchange/tags/cmiyc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cmiyc</span></a> <a href="https://infosec.exchange/tags/jtr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jtr</span></a> <a href="https://infosec.exchange/tags/johntheripper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>johntheripper</span></a> <a href="https://infosec.exchange/tags/golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>golang</span></a></p>
Royce Williams<p>Good breakdown from Elcomsoft on 5090 relevance to password cracking.</p><p>tl;dr better in theory, not yet in practice (perf/$). Not yet sure if driver or hashcat improvements could eventually take better advantage of new hardware features, though.</p><p><a href="https://blog.elcomsoft.com/2025/02/nvidia-blackwell-is-out-should-you-upgrade/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.elcomsoft.com/2025/02/nvi</span><span class="invisible">dia-blackwell-is-out-should-you-upgrade/</span></a></p><p><a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Royce Williams<p>The hashcat.net site is down -- side effect of maintenance by hosting provider. Being worked.<br>[Edit: back up a week later]</p><p>Current release (GitHub): <a href="https://github.com/hashcat/hashcat/releases/tag/v6.2.6" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/hashcat/hashcat/rel</span><span class="invisible">eases/tag/v6.2.6</span></a></p><p>Convenience Wayback links:</p><p><strong>Main page</strong>: <br><a href="https://web.archive.org/web/20250211000850/hashcat.net/hashcat/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025021100</span><span class="invisible">0850/hashcat.net/hashcat/</span></a></p><p><strong>Rules</strong>: <br><a href="https://web.archive.org/web/20250211234251/https://hashcat.net/wiki/doku.php?id=rule_based_attack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025021123</span><span class="invisible">4251/https://hashcat.net/wiki/doku.php?id=rule_based_attack</span></a></p><p><strong>Example hashes</strong> :<br><a href="https://web.archive.org/web/20250216060927/https://hashcat.net/wiki/doku.php?id=example_hashes" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025021606</span><span class="invisible">0927/https://hashcat.net/wiki/doku.php?id=example_hashes</span></a></p><p><strong>FAQ</strong>: <br><a href="https://web.archive.org/web/20250219024304/https://hashcat.net/wiki/doku.php?id=frequently_asked_questions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025021902</span><span class="invisible">4304/https://hashcat.net/wiki/doku.php?id=frequently_asked_questions</span></a></p><p>Recent beta:<br><a href="https://web.archive.org/web/20250130114639/https://hashcat.net/beta/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025013011</span><span class="invisible">4639/https://hashcat.net/beta/</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@hashcat" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hashcat</span></a></span> <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Royce Williams<p>Did you know that Gitea uses pbkdf2 hashes, but they have to be converted for hashcat to crack them? </p><p>Hashcat's own unix-ninja has written a tool for that!</p><p><a href="https://www.unix-ninja.com/p/cracking_giteas_pbkdf2_password_hashes" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">unix-ninja.com/p/cracking_gite</span><span class="invisible">as_pbkdf2_password_hashes</span></a></p><p><a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
Royce Williams<p>Great coverage by Jan Doskočil of NSEC3 hash enumeration, and cracking with hashcat. Also good info about the limits of making that harder (some resolvers cap the work factor they will resolve!)</p><p><a href="https://infosec.exchange/@jpmens@mastodon.social/114019491327504188" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@jpmens@masto</span><span class="invisible">don.social/114019491327504188</span></a></p><p>Via <span class="h-card" translate="no"><a href="https://mastodon.social/@jpmens" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jpmens</span></a></span> </p><p><a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://infosec.exchange/tags/NSEC3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSEC3</span></a> <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p>
alip<p><a href="https://mastodon.online/tags/sydbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sydbox</span></a> 3.32.0 is released! We now officially support <a href="https://mastodon.online/tags/GPU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPU</span></a> access for <a href="https://mastodon.online/tags/ROCm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ROCm</span></a> and <a href="https://mastodon.online/tags/nVIDIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nVIDIA</span></a>! See the release mail here: <a href="https://is.gd/kN1rUt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">is.gd/kN1rUt</span><span class="invisible"></span></a> and here is a profile auto-generated by <a href="https://mastodon.online/tags/pandora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pandora</span></a> for <a href="https://mastodon.online/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> accessing an <a href="https://mastodon.online/tags/nVIDIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nVIDIA</span></a> <a href="https://mastodon.online/tags/GPU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPU</span></a> using <a href="https://mastodon.online/tags/cuda" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cuda</span></a> libraries: <a href="https://dpaste.com/6DQ97T2DM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dpaste.com/6DQ97T2DM</span><span class="invisible"></span></a> <a href="https://mastodon.online/tags/exherbo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exherbo</span></a> <a href="https://mastodon.online/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Cyclone<p>Nvidia RTX 5090 hashcat benchmarks.</p><p><a href="https://forum.hashpwn.net/post/391" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forum.hashpwn.net/post/391</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a> <a href="https://infosec.exchange/tags/nvidia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nvidia</span></a> #5090 <a href="https://infosec.exchange/tags/rtx5090" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rtx5090</span></a> <a href="https://infosec.exchange/tags/hashcracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcracking</span></a> <a href="https://infosec.exchange/tags/hashpwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashpwn</span></a></p>