Jump to content

WinRar Password Remover


Recommended Posts

26 minutes ago, Rootware said:

You need good GPU and this tool.

Im currently trying with winrar password cracker bruteforcing the .rar in a dedicate host i do own,i dont think that it has a good Gpu? U think it will work there,also have you tried this,because with winrar it takes like ages and no result at all.

Link to comment
Share on other sites

8 minutes ago, InTheEndॐ said:

Im currently trying with winrar password cracker bruteforcing the .rar in a dedicate host i do own,i dont think that it has a good Gpu? U think it will work there,also have you tried this,because with winrar it takes like ages and no result at all.

 

You need read tutorial for this program before thinking about unsuccessful result. You even does not know about hash rate of you GPU for judgement of potencial results. GPU have more performance than CPU.

 

The elapsed time for brute WinRAR password relates only with password length and using dictionaries.

 

Anyway, check YouTube for tutorials for make a choice.

Link to comment
Share on other sites

53 minutes ago, Rootware said:

 

You need read tutorial for this program before thinking about unsuccessful result. You even does not know about hash rate of you GPU for judgement of potencial results. GPU have more performance than CPU.

 

The elapsed time for brute WinRAR password relates only with password length and using dictionaries.

 

Anyway, check YouTube for tutorials for make a choice.

He hasn't GPU :laughing:

  • Haha 1
Link to comment
Share on other sites

Obviously, he tried to use HashCat on the laptop.

 

For AMD RX480 Nitro this results of benchmark:

 

Quote

c:\hashcat-6.1.1>hashcat.exe -b
hashcat (v6.1.1) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

OpenCL API (OpenCL 2.1 AMD-APP (3004.8)) - Platform #1 [Advanced Micro Devices, Inc.]
=====================================================================================
* Device #1: Ellesmere, 4032/4096 MB (3264 MB allocatable), 36MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 0 - MD5

Speed.#1.........: 13034.9 MH/s (91.87ms) @ Accel:1024 Loops:512 Thr:64 Vec:1

Hashmode: 100 - SHA1

Speed.#1.........:  4098.3 MH/s (72.93ms) @ Accel:256 Loops:512 Thr:64 Vec:1

Hashmode: 1400 - SHA2-256

Speed.#1.........:  1752.3 MH/s (85.44ms) @ Accel:64 Loops:1024 Thr:64 Vec:1

Hashmode: 1700 - SHA2-512

Speed.#1.........:   444.1 MH/s (84.30ms) @ Accel:32 Loops:512 Thr:64 Vec:1

Hashmode: 22000 - WPA-PBKDF2-PMKID+EAPOL (Iterations: 4095)

Speed.#1.........:   210.9 kH/s (86.79ms) @ Accel:256 Loops:128 Thr:64 Vec:1

Hashmode: 1000 - NTLM

Speed.#1.........: 20616.9 MH/s (57.85ms) @ Accel:1024 Loops:512 Thr:64 Vec:1

Hashmode: 3000 - LM

Speed.#1.........: 12458.3 MH/s (95.99ms) @ Accel:512 Loops:1024 Thr:64 Vec:1

Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS

Speed.#1.........: 11734.4 MH/s (50.83ms) @ Accel:1024 Loops:256 Thr:64 Vec:1

Hashmode: 5600 - NetNTLMv2

Speed.#1.........:   821.3 MH/s (91.28ms) @ Accel:32 Loops:1024 Thr:64 Vec:1

Hashmode: 1500 - descrypt, DES (Unix), Traditional DES

Speed.#1.........:   470.1 MH/s (79.35ms) @ Accel:16 Loops:1024 Thr:64 Vec:1

Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000)

Speed.#1.........:  5011.8 kH/s (56.53ms) @ Accel:512 Loops:250 Thr:64 Vec:1

Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32)

Speed.#1.........:     5387 H/s (51.12ms) @ Accel:1 Loops:32 Thr:8 Vec:1

Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000)

Speed.#1.........:    73366 H/s (98.49ms) @ Accel:32 Loops:512 Thr:64 Vec:1

Hashmode: 7500 - Kerberos 5, etype 23, AS-REQ Pre-Auth

Speed.#1.........:   127.0 MH/s (73.71ms) @ Accel:128 Loops:32 Thr:64 Vec:1

Hashmode: 13100 - Kerberos 5, etype 23, TGS-REP

Speed.#1.........:   125.4 MH/s (74.65ms) @ Accel:128 Loops:32 Thr:64 Vec:1

Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999)

* Device #1: Skipping hash-mode 15300 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue)
             You can use --force to override, but do not report related errors.

Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 12899)

Speed.#1.........:    11420 H/s (62.81ms) @ Accel:16 Loops:256 Thr:64 Vec:1

Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 1023)

* Device #1: Skipping hash-mode 7100 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue)
             You can use --force to override, but do not report related errors.

Hashmode: 11600 - 7-Zip (Iterations: 16384)

Speed.#1.........:   224.5 kH/s (77.68ms) @ Accel:32 Loops:4096 Thr:64 Vec:1

Hashmode: 12500 - RAR3-hp (Iterations: 262144)

Speed.#1.........:    24178 H/s (47.20ms) @ Accel:8 Loops:16384 Thr:64 Vec:1

Hashmode: 13000 - RAR5 (Iterations: 32799)

Speed.#1.........:    22150 H/s (51.52ms) @ Accel:64 Loops:256 Thr:64 Vec:1

Hashmode: 6211 - TrueCrypt RIPEMD160 + XTS 512 bit (Iterations: 1999)

Speed.#1.........:   162.7 kH/s (55.66ms) @ Accel:64 Loops:128 Thr:64 Vec:1

Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 24569)

Speed.#1.........:    43479 H/s (140.64ms) @ Accel:512 Loops:128 Thr:64 Vec:1

Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 499)

Speed.#1.........:  1436.8 kH/s (79.55ms) @ Accel:256 Loops:124 Thr:64 Vec:1

Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 200459)

* Device #1: Skipping hash-mode 11300 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue)
             You can use --force to override, but do not report related errors.

Started: Sun Sep 20 20:50:50 2020
Stopped: Sun Sep 20 20:55:54 2020

 

Link to comment
Share on other sites

On 9/20/2020 at 8:58 PM, Rootware said:

Obviously, he tried to use HashCat on the laptop.

 

For AMD RX480 Nitro this results of benchmark:

 

 

No i didnt even tried to use it,because i actually have no GPU at all :D

 

If anyone is able to crack/remove the password somehow i would be pleased to pay for such a service.

Link to comment
Share on other sites

44 minutes ago, Loftheim said:

I guess thats the reason why people are crypto mining with GPUs instead of CPUs

 

Because GPU has thousands computing units?

Link to comment
Share on other sites

  • 3 years later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...