oclHashcat 1.30 The fastest password Cracker

The oclHashcat is one of the fastest password cracking tools that GPU to "decode" md5crypt, phpass, mscash2 and WPA / WPA2. The first and only one he uses GPGPU rule engine.

oclhashcat

Those of you who know the tool and look for it oclHashcat-plus, you should know that particular version has been abolished but all of its services are in oclHashcat. The application runs on all versions of Windows and Linux on 32 and 64 bit.

IGuRu.gr presents this tool to protect your systems and ONLY for that reason. We are against any kind of malicious use of the tool.

Download latest version

Name Version md5sum Date:
oclHashcat for AMD v1.30 4e6e77bbdb15df534348f7745dbc5d0a 2014.08.21
oclHashcat for v1.30 1e17da4d927c6745c560af2c608337aa 2014.08.21

GPU Driver requirements:

  • NV users require ForceWare 331.67 or later
  • AMD users require Catalyst 14.6b or later

  • Worlds fastest Password cracker
  • Worlds first and only GPGPU based rule engine
  • Free
  • Multi-GPU (up to 128 gpus)
  • Multi-Hash (up to 100 million hashes)
  • (Linux & Windows native binaries)
  • Multi-Platform (OpenCL & CUDA )
  • Multi-Algo (see below)
  • Low resource utilization, you can still watch movies or play games while
  • Focuses highly iterated modern hashes
  • Focuses dictionary based attacks
  • Supports distributed cracking
  • Supports pause / summarizes while cracking
  • Supports sessions
  • Supports restore
  • Supports reading words from fillet
  • Supports reading words from stdin
  • Supports hex-salt
  • Supports hex-charset
  • Built-in benchmarking system
  • Integrated thermal watchdog
  • 100 + Algorithms implemented with performance in mind
  • ... and much more

oclHashcat Screenshot

oclHashcat screenshot

Attack-Modes

  • Straight *
  • Combination
  • Brute-force
  • Hybrid dict + mask
  • Hybrid mask + dict

* accept Rules

Algorithms

  • MD4
  • MD5
  • SHA1
  • SHA-256
  • SHA-512
  • SHA-3 (Keccak)
  • RipeMD160
  • Whirlpool
  • GOST R 34.11-94
  • HMAC-MD5 (key = $ pass)
  • HMAC-MD5 (key = $ salt)
  • HMAC-SHA1 (key = $ pass)
  • HMAC-SHA1 (key = $ salt)
  • HMAC-SHA256 (key = $ pass)
  • HMAC-SHA256 (key = $ salt)
  • HMAC-SHA512 (key = $ pass)
  • HMAC-SHA512 (key = $ salt)
  • LM
  • NTLM
  • DCC
  • DCC2
  • NetNTLMv1
  • NetNTLMv1 + ESS
  • NetNTLMv2
  • Kerberos 5 AS-REQ Pre-Authentication 23
  • AIX {smd5}
  • AIX {ssha1}
  • AIX {ssha256}
  • AIX {ssha512}
  • FreeBSD MD5
  • OpenBSD Blowfish
  • descrypt
  • md5crypt
  • bcrypt
  • scrypt
  • sha256crypt
  • sha512crypt
  • DES (Unix)
  • MD5 (Unix)
  • SHA256 (Unix)
  • SHA512 (Unix)
  • OSX v10.4
  • OSX v10.5
  • OSX v10.6
  • OSX v10.7
  • OSX v10.8
  • OSX v10.9
  • Cisco-ASA
  • Cisco-IOS
  • Cisco-PIX
  • GRUB 2
  • Juniper Netscreen / SSG (ScreenOS)
  • RACF
  • Android PIN
  • Android FDE
  • MSSQL
  • MySQL
  • Oracle
  • Postgres
  • Sybase
  • DNSSEC (NSEC3)
  • IKE-PSK
  • IPMI2 RAKP
  • iSCSI CHAP
  • WPA
  • WPA2
  • 1Password, cloudkeychain
  • 1Password, agilekeychain
  • LastPass
  • Password Safe v2
  • Password Safe v3
  • TrueCrypt 5.0 + PBKDF2 HMAC-RipeMD160 + AES
  • TrueCrypt 5.0 + PBKDF2 HMAC-SHA512 + AES
  • TrueCrypt 5.0 + PBKDF2 HMAC-Whirlpool + AES
  • TrueCrypt 5.0 + PBKDF2 HMAC-RipeMD160 + BEA + boot-mode
  • TrueCrypt 5.0 + PBKDF2 HMAC-RipeMD160 + BEA + hidden-volume
  • TrueCrypt 5.0 + PBKDF2 HMAC-SHA512 + BEA + hidden-volume
  • TrueCrypt 5.0 + PBKDF2 HMAC-Whirlpool + BEA + hidden-volume
  • TrueCrypt 5.0 + PBKDF2 HMAC-RipeMD160 + BEA + hidden-volume + boot-mode
  • SAP CODVN B (BCODE)
  • SAP CODVN F / G (PASSCODE)
  • Lotus Notes / Domino 5
  • Lotus Notes / Domino 6
  • Lotus Notes / Domino 8
  • PeopleSoft
  • Citrix Netscaler
  • Netscape LDAP SHA / SSHA
  • Apache MD5-APR
  • Skype or Whatsapp
  • hMailServer
  • EPiServer
  • Drupal
  • IPB
  • Joomla
  • MyBB
  • osCommerce
  • Redmine
  • SMF
  • vBulletin
  • PHPS
  • Mediawiki B type
  • Woltlab Burning Board
  • xt: Commerce
  • WordPress
  • phpBB3
  • MD5 Half (Left, Mid, Right)
  • Double MD5
  • Double SHA1
  • md5 ($ pass. $ salt)
  • md5 ($ salt. $ pass)
  • md5 (unicode ($ pass) $ salt)
  • md5 ($ salt.unicode ($ pass))
  • md5 (sha1 ($ pass))
  • md5 ($ salt.md5 ($ pass))
  • sha1 ($ pass. $ salt)
  • sha1 ($ salt. $ pass)
  • sha1 (unicode ($ pass) $ salt)
  • sha1 ($ salt.unicode ($ pass))
  • sha1 (md5 ($ pass))
  • sha256 ($ pass. $ salt)
  • sha256 ($ salt. $ pass)
  • sha256 (unicode ($ pass) $ salt)
  • sha256 ($ salt.unicode ($ pass))
  • sha512 ($ pass. $ salt)
  • sha512 ($ salt. $ pass)
  • sha512 (unicode ($ pass) $ salt)
  • sha512 ($ salt.unicode ($ pass))

Tested OS

  • All Windows and Linux versions should work on both 32 and 64 bits

Tested GPU

  • All CUDA and Stream enabled cards should work

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).