Jump to content

Recommended Posts

Posted
26 minutes ago, Rootware said:

You need good GPU and this tool.

Im currently trying with winrar password cracker bruteforcing the .rar in a dedicate host i do own,i dont think that it has a good Gpu? U think it will work there,also have you tried this,because with winrar it takes like ages and no result at all.

Posted
8 minutes ago, InTheEndॐ said:

Im currently trying with winrar password cracker bruteforcing the .rar in a dedicate host i do own,i dont think that it has a good Gpu? U think it will work there,also have you tried this,because with winrar it takes like ages and no result at all.

 

You need read tutorial for this program before thinking about unsuccessful result. You even does not know about hash rate of you GPU for judgement of potencial results. GPU have more performance than CPU.

 

The elapsed time for brute WinRAR password relates only with password length and using dictionaries.

 

Anyway, check YouTube for tutorials for make a choice.

Posted
53 minutes ago, Rootware said:

 

You need read tutorial for this program before thinking about unsuccessful result. You even does not know about hash rate of you GPU for judgement of potencial results. GPU have more performance than CPU.

 

The elapsed time for brute WinRAR password relates only with password length and using dictionaries.

 

Anyway, check YouTube for tutorials for make a choice.

He hasn't GPU :laughing:

  • Haha 1
Posted

Obviously, he tried to use HashCat on the laptop.

 

For AMD RX480 Nitro this results of benchmark:

 

Quote

c:\hashcat-6.1.1>hashcat.exe -b
hashcat (v6.1.1) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

OpenCL API (OpenCL 2.1 AMD-APP (3004.8)) - Platform #1 [Advanced Micro Devices, Inc.]
=====================================================================================
* Device #1: Ellesmere, 4032/4096 MB (3264 MB allocatable), 36MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 0 - MD5

Speed.#1.........: 13034.9 MH/s (91.87ms) @ Accel:1024 Loops:512 Thr:64 Vec:1

Hashmode: 100 - SHA1

Speed.#1.........:  4098.3 MH/s (72.93ms) @ Accel:256 Loops:512 Thr:64 Vec:1

Hashmode: 1400 - SHA2-256

Speed.#1.........:  1752.3 MH/s (85.44ms) @ Accel:64 Loops:1024 Thr:64 Vec:1

Hashmode: 1700 - SHA2-512

Speed.#1.........:   444.1 MH/s (84.30ms) @ Accel:32 Loops:512 Thr:64 Vec:1

Hashmode: 22000 - WPA-PBKDF2-PMKID+EAPOL (Iterations: 4095)

Speed.#1.........:   210.9 kH/s (86.79ms) @ Accel:256 Loops:128 Thr:64 Vec:1

Hashmode: 1000 - NTLM

Speed.#1.........: 20616.9 MH/s (57.85ms) @ Accel:1024 Loops:512 Thr:64 Vec:1

Hashmode: 3000 - LM

Speed.#1.........: 12458.3 MH/s (95.99ms) @ Accel:512 Loops:1024 Thr:64 Vec:1

Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS

Speed.#1.........: 11734.4 MH/s (50.83ms) @ Accel:1024 Loops:256 Thr:64 Vec:1

Hashmode: 5600 - NetNTLMv2

Speed.#1.........:   821.3 MH/s (91.28ms) @ Accel:32 Loops:1024 Thr:64 Vec:1

Hashmode: 1500 - descrypt, DES (Unix), Traditional DES

Speed.#1.........:   470.1 MH/s (79.35ms) @ Accel:16 Loops:1024 Thr:64 Vec:1

Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000)

Speed.#1.........:  5011.8 kH/s (56.53ms) @ Accel:512 Loops:250 Thr:64 Vec:1

Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32)

Speed.#1.........:     5387 H/s (51.12ms) @ Accel:1 Loops:32 Thr:8 Vec:1

Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000)

Speed.#1.........:    73366 H/s (98.49ms) @ Accel:32 Loops:512 Thr:64 Vec:1

Hashmode: 7500 - Kerberos 5, etype 23, AS-REQ Pre-Auth

Speed.#1.........:   127.0 MH/s (73.71ms) @ Accel:128 Loops:32 Thr:64 Vec:1

Hashmode: 13100 - Kerberos 5, etype 23, TGS-REP

Speed.#1.........:   125.4 MH/s (74.65ms) @ Accel:128 Loops:32 Thr:64 Vec:1

Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999)

* Device #1: Skipping hash-mode 15300 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue)
             You can use --force to override, but do not report related errors.

Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 12899)

Speed.#1.........:    11420 H/s (62.81ms) @ Accel:16 Loops:256 Thr:64 Vec:1

Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 1023)

* Device #1: Skipping hash-mode 7100 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue)
             You can use --force to override, but do not report related errors.

Hashmode: 11600 - 7-Zip (Iterations: 16384)

Speed.#1.........:   224.5 kH/s (77.68ms) @ Accel:32 Loops:4096 Thr:64 Vec:1

Hashmode: 12500 - RAR3-hp (Iterations: 262144)

Speed.#1.........:    24178 H/s (47.20ms) @ Accel:8 Loops:16384 Thr:64 Vec:1

Hashmode: 13000 - RAR5 (Iterations: 32799)

Speed.#1.........:    22150 H/s (51.52ms) @ Accel:64 Loops:256 Thr:64 Vec:1

Hashmode: 6211 - TrueCrypt RIPEMD160 + XTS 512 bit (Iterations: 1999)

Speed.#1.........:   162.7 kH/s (55.66ms) @ Accel:64 Loops:128 Thr:64 Vec:1

Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 24569)

Speed.#1.........:    43479 H/s (140.64ms) @ Accel:512 Loops:128 Thr:64 Vec:1

Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 499)

Speed.#1.........:  1436.8 kH/s (79.55ms) @ Accel:256 Loops:124 Thr:64 Vec:1

Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 200459)

* Device #1: Skipping hash-mode 11300 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue)
             You can use --force to override, but do not report related errors.

Started: Sun Sep 20 20:50:50 2020
Stopped: Sun Sep 20 20:55:54 2020

 

Posted
On 9/20/2020 at 8:58 PM, Rootware said:

Obviously, he tried to use HashCat on the laptop.

 

For AMD RX480 Nitro this results of benchmark:

 

 

No i didnt even tried to use it,because i actually have no GPU at all :D

 

If anyone is able to crack/remove the password somehow i would be pleased to pay for such a service.

  • 3 years later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...