InTheEndॐ Posted September 19, 2020 Posted September 19, 2020 Is anyone here able to remove or find a password from a .rar archive? I've tried some methods but nothing really worked. Quote
InTheEndॐ Posted September 19, 2020 Author Posted September 19, 2020 26 minutes ago, Rootware said: You need good GPU and this tool. Im currently trying with winrar password cracker bruteforcing the .rar in a dedicate host i do own,i dont think that it has a good Gpu? U think it will work there,also have you tried this,because with winrar it takes like ages and no result at all. Quote
Rootware Posted September 19, 2020 Posted September 19, 2020 8 minutes ago, InTheEndॐ said: Im currently trying with winrar password cracker bruteforcing the .rar in a dedicate host i do own,i dont think that it has a good Gpu? U think it will work there,also have you tried this,because with winrar it takes like ages and no result at all. You need read tutorial for this program before thinking about unsuccessful result. You even does not know about hash rate of you GPU for judgement of potencial results. GPU have more performance than CPU. The elapsed time for brute WinRAR password relates only with password length and using dictionaries. Anyway, check YouTube for tutorials for make a choice. Quote
Ugleethyn Posted September 19, 2020 Posted September 19, 2020 53 minutes ago, Rootware said: You need read tutorial for this program before thinking about unsuccessful result. You even does not know about hash rate of you GPU for judgement of potencial results. GPU have more performance than CPU. The elapsed time for brute WinRAR password relates only with password length and using dictionaries. Anyway, check YouTube for tutorials for make a choice. He hasn't GPU 1 Quote
InTheEndॐ Posted September 19, 2020 Author Posted September 19, 2020 2 minutes ago, Ugleethyn said: He hasn't GPU Sad story 1 Quote
Rootware Posted September 20, 2020 Posted September 20, 2020 Obviously, he tried to use HashCat on the laptop. For AMD RX480 Nitro this results of benchmark: Quote c:\hashcat-6.1.1>hashcat.exe -b hashcat (v6.1.1) starting in benchmark mode... Benchmarking uses hand-optimized kernel code by default. You can use it in your cracking session by setting the -O option. Note: Using optimized kernel code limits the maximum supported password length. To disable the optimized kernel code in benchmark mode, use the -w option. OpenCL API (OpenCL 2.1 AMD-APP (3004.8)) - Platform #1 [Advanced Micro Devices, Inc.] ===================================================================================== * Device #1: Ellesmere, 4032/4096 MB (3264 MB allocatable), 36MCU Benchmark relevant options: =========================== * --optimized-kernel-enable Hashmode: 0 - MD5 Speed.#1.........: 13034.9 MH/s (91.87ms) @ Accel:1024 Loops:512 Thr:64 Vec:1 Hashmode: 100 - SHA1 Speed.#1.........: 4098.3 MH/s (72.93ms) @ Accel:256 Loops:512 Thr:64 Vec:1 Hashmode: 1400 - SHA2-256 Speed.#1.........: 1752.3 MH/s (85.44ms) @ Accel:64 Loops:1024 Thr:64 Vec:1 Hashmode: 1700 - SHA2-512 Speed.#1.........: 444.1 MH/s (84.30ms) @ Accel:32 Loops:512 Thr:64 Vec:1 Hashmode: 22000 - WPA-PBKDF2-PMKID+EAPOL (Iterations: 4095) Speed.#1.........: 210.9 kH/s (86.79ms) @ Accel:256 Loops:128 Thr:64 Vec:1 Hashmode: 1000 - NTLM Speed.#1.........: 20616.9 MH/s (57.85ms) @ Accel:1024 Loops:512 Thr:64 Vec:1 Hashmode: 3000 - LM Speed.#1.........: 12458.3 MH/s (95.99ms) @ Accel:512 Loops:1024 Thr:64 Vec:1 Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS Speed.#1.........: 11734.4 MH/s (50.83ms) @ Accel:1024 Loops:256 Thr:64 Vec:1 Hashmode: 5600 - NetNTLMv2 Speed.#1.........: 821.3 MH/s (91.28ms) @ Accel:32 Loops:1024 Thr:64 Vec:1 Hashmode: 1500 - descrypt, DES (Unix), Traditional DES Speed.#1.........: 470.1 MH/s (79.35ms) @ Accel:16 Loops:1024 Thr:64 Vec:1 Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000) Speed.#1.........: 5011.8 kH/s (56.53ms) @ Accel:512 Loops:250 Thr:64 Vec:1 Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32) Speed.#1.........: 5387 H/s (51.12ms) @ Accel:1 Loops:32 Thr:8 Vec:1 Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000) Speed.#1.........: 73366 H/s (98.49ms) @ Accel:32 Loops:512 Thr:64 Vec:1 Hashmode: 7500 - Kerberos 5, etype 23, AS-REQ Pre-Auth Speed.#1.........: 127.0 MH/s (73.71ms) @ Accel:128 Loops:32 Thr:64 Vec:1 Hashmode: 13100 - Kerberos 5, etype 23, TGS-REP Speed.#1.........: 125.4 MH/s (74.65ms) @ Accel:128 Loops:32 Thr:64 Vec:1 Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999) * Device #1: Skipping hash-mode 15300 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue) You can use --force to override, but do not report related errors. Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 12899) Speed.#1.........: 11420 H/s (62.81ms) @ Accel:16 Loops:256 Thr:64 Vec:1 Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 1023) * Device #1: Skipping hash-mode 7100 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue) You can use --force to override, but do not report related errors. Hashmode: 11600 - 7-Zip (Iterations: 16384) Speed.#1.........: 224.5 kH/s (77.68ms) @ Accel:32 Loops:4096 Thr:64 Vec:1 Hashmode: 12500 - RAR3-hp (Iterations: 262144) Speed.#1.........: 24178 H/s (47.20ms) @ Accel:8 Loops:16384 Thr:64 Vec:1 Hashmode: 13000 - RAR5 (Iterations: 32799) Speed.#1.........: 22150 H/s (51.52ms) @ Accel:64 Loops:256 Thr:64 Vec:1 Hashmode: 6211 - TrueCrypt RIPEMD160 + XTS 512 bit (Iterations: 1999) Speed.#1.........: 162.7 kH/s (55.66ms) @ Accel:64 Loops:128 Thr:64 Vec:1 Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 24569) Speed.#1.........: 43479 H/s (140.64ms) @ Accel:512 Loops:128 Thr:64 Vec:1 Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 499) Speed.#1.........: 1436.8 kH/s (79.55ms) @ Accel:256 Loops:124 Thr:64 Vec:1 Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 200459) * Device #1: Skipping hash-mode 11300 - known CUDA/OpenCL Runtime/Driver issue (not a hashcat issue) You can use --force to override, but do not report related errors. Started: Sun Sep 20 20:50:50 2020 Stopped: Sun Sep 20 20:55:54 2020 Quote
InTheEndॐ Posted September 23, 2020 Author Posted September 23, 2020 On 9/20/2020 at 8:58 PM, Rootware said: Obviously, he tried to use HashCat on the laptop. For AMD RX480 Nitro this results of benchmark: No i didnt even tried to use it,because i actually have no GPU at all :D If anyone is able to crack/remove the password somehow i would be pleased to pay for such a service. Quote
InTheEndॐ Posted September 30, 2020 Author Posted September 30, 2020 Can anyone rent me some? :D Quote
Rootware Posted September 30, 2020 Posted September 30, 2020 46 minutes ago, Loftheim said: Imagine doing this with RTX 3000s series. Around x5-x7 times faster. Quote
Rootware Posted September 30, 2020 Posted September 30, 2020 44 minutes ago, Loftheim said: I guess thats the reason why people are crypto mining with GPUs instead of CPUs Because GPU has thousands computing units? Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.