2019-08-07 13:46:21 +00:00
|
|
|
|
|
|
|
_____: _____________ _____: -aTZ! _______ ____
|
|
|
|
_\ |__\_______ _/_______ _\ |_____ _______\______ /__ ______
|
|
|
|
| _ | __ \ ____/____ _ | ___/____ __ |_______/
|
|
|
|
|: | .| \ _\____ / | .| \ / \ :| |
|
|
|
|
|_____| :|______/ / //____| :|___ //_________| :|
|
|
|
|
|_____| /___________/ |_____| /_____/ /_______|
|
|
|
|
: : :
|
|
|
|
|
2022-08-30 08:12:26 +00:00
|
|
|
hashcat v6.2.6
|
2017-03-31 13:28:20 +00:00
|
|
|
==============
|
2016-05-10 17:07:07 +00:00
|
|
|
|
2022-08-30 08:12:26 +00:00
|
|
|
AMD GPUs on Linux require "AMDGPU" (21.50 or later) and "ROCm" (5.0 or later)
|
2023-01-04 08:36:37 +00:00
|
|
|
AMD GPUs on Windows require "AMD Adrenalin Edition" (Adrenalin 22.5.1 exactly)
|
2017-03-26 17:52:36 +00:00
|
|
|
Intel CPUs require "OpenCL Runtime for Intel Core and Intel Xeon Processors" (16.1.1 or later)
|
2020-04-01 08:16:49 +00:00
|
|
|
NVIDIA GPUs require "NVIDIA Driver" (440.64 or later) and "CUDA Toolkit" (9.0 or later)
|
2015-12-04 14:47:52 +00:00
|
|
|
|
|
|
|
##
|
|
|
|
## Features
|
|
|
|
##
|
|
|
|
|
|
|
|
- World's fastest password cracker
|
2016-05-10 17:07:07 +00:00
|
|
|
- World's first and only in-kernel rule engine
|
2015-12-04 14:47:52 +00:00
|
|
|
- Free
|
2016-02-04 09:59:13 +00:00
|
|
|
- Open-Source (MIT License)
|
2017-10-20 11:36:47 +00:00
|
|
|
- Multi-OS (Linux, Windows and macOS)
|
2020-06-16 13:08:32 +00:00
|
|
|
- Multi-Platform (CPU, GPU, APU, etc., everything that comes with an OpenCL runtime)
|
2016-02-04 09:59:13 +00:00
|
|
|
- Multi-Hash (Cracking multiple hashes at the same time)
|
|
|
|
- Multi-Devices (Utilizing multiple devices in same system)
|
|
|
|
- Multi-Device-Types (Utilizing mixed device types in same system)
|
2018-10-28 15:47:13 +00:00
|
|
|
- Supports password candidate brain functionality
|
2016-02-04 09:59:13 +00:00
|
|
|
- Supports distributed cracking networks (using overlay)
|
|
|
|
- Supports interactive pause / resume
|
2015-12-04 14:47:52 +00:00
|
|
|
- Supports sessions
|
|
|
|
- Supports restore
|
2016-04-29 03:28:49 +00:00
|
|
|
- Supports reading password candidates from file and stdin
|
2015-12-04 14:47:52 +00:00
|
|
|
- Supports hex-salt and hex-charset
|
2016-04-29 03:28:49 +00:00
|
|
|
- Supports automatic performance tuning
|
|
|
|
- Supports automatic keyspace ordering markov-chains
|
2015-12-04 14:47:52 +00:00
|
|
|
- Built-in benchmarking system
|
|
|
|
- Integrated thermal watchdog
|
2020-02-11 10:42:49 +00:00
|
|
|
- 300+ Hash-types implemented with performance in mind
|
2015-12-04 14:47:52 +00:00
|
|
|
|
|
|
|
##
|
|
|
|
## Hash-Types
|
|
|
|
##
|
|
|
|
|
|
|
|
- MD4
|
|
|
|
- MD5
|
|
|
|
- SHA1
|
2018-10-15 08:39:28 +00:00
|
|
|
- SHA2-224
|
|
|
|
- SHA2-256
|
|
|
|
- SHA2-384
|
|
|
|
- SHA2-512
|
|
|
|
- SHA3-224
|
|
|
|
- SHA3-256
|
|
|
|
- SHA3-384
|
|
|
|
- SHA3-512
|
2019-08-07 13:46:21 +00:00
|
|
|
- RIPEMD-160
|
|
|
|
- BLAKE2b-512
|
2023-02-10 10:26:52 +00:00
|
|
|
- BLAKE2s-256
|
2023-03-04 20:58:11 +00:00
|
|
|
- SM3
|
2019-08-07 13:46:21 +00:00
|
|
|
- GOST R 34.11-2012 (Streebog) 256-bit, big-endian
|
|
|
|
- GOST R 34.11-2012 (Streebog) 512-bit, big-endian
|
|
|
|
- GOST R 34.11-94
|
|
|
|
- Half MD5
|
2018-10-15 08:39:28 +00:00
|
|
|
- Keccak-224
|
|
|
|
- Keccak-256
|
|
|
|
- Keccak-384
|
|
|
|
- Keccak-512
|
2015-12-04 14:47:52 +00:00
|
|
|
- Whirlpool
|
2019-08-07 13:46:21 +00:00
|
|
|
- SipHash
|
2021-05-28 18:06:01 +00:00
|
|
|
- md5(utf16le($pass))
|
|
|
|
- sha1(utf16le($pass))
|
|
|
|
- sha256(utf16le($pass))
|
2021-05-29 08:46:28 +00:00
|
|
|
- sha384(utf16le($pass))
|
2021-05-28 18:06:01 +00:00
|
|
|
- sha512(utf16le($pass))
|
2023-03-04 20:58:11 +00:00
|
|
|
- BLAKE2b-512($pass.$salt)
|
|
|
|
- BLAKE2b-512($salt.$pass)
|
2015-12-04 14:47:52 +00:00
|
|
|
- md5($pass.$salt)
|
|
|
|
- md5($salt.$pass)
|
|
|
|
- md5($salt.$pass.$salt)
|
2017-01-31 10:44:58 +00:00
|
|
|
- md5($salt.md5($pass))
|
2017-02-01 18:56:49 +00:00
|
|
|
- md5($salt.md5($pass.$salt))
|
2019-08-07 13:46:21 +00:00
|
|
|
- md5($salt.md5($salt.$pass))
|
|
|
|
- md5($salt.sha1($salt.$pass))
|
|
|
|
- md5($salt.utf16le($pass))
|
2023-03-04 20:58:11 +00:00
|
|
|
- md5($salt1.strtoupper(md5($salt2.$pass)))
|
2017-01-31 10:44:58 +00:00
|
|
|
- md5(md5($pass))
|
2017-02-12 17:12:17 +00:00
|
|
|
- md5(md5($pass).md5($salt))
|
2021-06-03 05:57:59 +00:00
|
|
|
- md5(md5(md5($pass)))
|
2023-04-01 09:00:55 +00:00
|
|
|
- md5(md5(md5($pass).$salt1).$salt2)
|
2017-01-31 10:44:58 +00:00
|
|
|
- md5(sha1($pass))
|
2022-06-18 16:11:00 +00:00
|
|
|
- md5(sha1($pass).$salt)
|
2019-08-07 13:46:21 +00:00
|
|
|
- md5(sha1($pass).md5($pass).sha1($pass))
|
|
|
|
- md5(sha1($salt).md5($pass))
|
|
|
|
- md5(strtoupper(md5($pass)))
|
|
|
|
- md5(utf16le($pass).$salt)
|
2015-12-04 14:47:52 +00:00
|
|
|
- sha1($pass.$salt)
|
|
|
|
- sha1($salt.$pass)
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha1($salt.$pass.$salt)
|
2017-01-31 10:44:58 +00:00
|
|
|
- sha1($salt.sha1($pass))
|
2021-05-06 09:17:28 +00:00
|
|
|
- sha1($salt.sha1($pass.$salt))
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha1($salt.utf16le($pass))
|
|
|
|
- sha1($salt1.$pass.$salt2)
|
|
|
|
- sha1(CX)
|
2015-12-04 14:47:52 +00:00
|
|
|
- sha1(md5($pass))
|
2019-07-25 23:46:43 +00:00
|
|
|
- sha1(md5($pass).$salt)
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha1(md5($pass.$salt))
|
2018-12-10 15:50:58 +00:00
|
|
|
- sha1(md5(md5($pass)))
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha1(sha1($pass))
|
2020-09-08 09:45:03 +00:00
|
|
|
- sha1(sha1($pass).$salt)
|
2021-06-03 05:57:59 +00:00
|
|
|
- sha1(sha1($salt.$pass.$salt))
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha1(utf16le($pass).$salt)
|
2015-12-04 14:47:52 +00:00
|
|
|
- sha256($pass.$salt)
|
|
|
|
- sha256($salt.$pass)
|
2020-01-15 08:16:05 +00:00
|
|
|
- sha256($salt.$pass.$salt)
|
2021-06-03 05:57:59 +00:00
|
|
|
- sha256($salt.sha256($pass))
|
2021-12-30 08:04:26 +00:00
|
|
|
- sha256($salt.sha256_bin($pass))
|
2018-01-30 10:24:21 +00:00
|
|
|
- sha256($salt.utf16le($pass))
|
2019-07-13 18:51:38 +00:00
|
|
|
- sha256(md5($pass))
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha256(sha256($pass).$salt)
|
2020-01-15 08:16:05 +00:00
|
|
|
- sha256(sha256_bin($pass))
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha256(utf16le($pass).$salt)
|
2020-12-17 03:45:33 +00:00
|
|
|
- sha384($pass.$salt)
|
2020-12-17 04:39:04 +00:00
|
|
|
- sha384($salt.$pass)
|
2020-12-17 02:41:16 +00:00
|
|
|
- sha384($salt.utf16le($pass))
|
2021-05-28 16:57:24 +00:00
|
|
|
- sha384(utf16le($pass).$salt)
|
2015-12-04 14:47:52 +00:00
|
|
|
- sha512($pass.$salt)
|
|
|
|
- sha512($salt.$pass)
|
2018-01-30 10:24:21 +00:00
|
|
|
- sha512($salt.utf16le($pass))
|
2019-08-07 13:46:21 +00:00
|
|
|
- sha512(utf16le($pass).$salt)
|
2015-12-04 14:47:52 +00:00
|
|
|
- HMAC-MD5 (key = $pass)
|
|
|
|
- HMAC-MD5 (key = $salt)
|
2023-03-04 20:58:11 +00:00
|
|
|
- HMAC-RIPEMD160 (key = $pass)
|
|
|
|
- HMAC-RIPEMD160 (key = $salt)
|
2015-12-04 14:47:52 +00:00
|
|
|
- HMAC-SHA1 (key = $pass)
|
|
|
|
- HMAC-SHA1 (key = $salt)
|
|
|
|
- HMAC-SHA256 (key = $pass)
|
|
|
|
- HMAC-SHA256 (key = $salt)
|
|
|
|
- HMAC-SHA512 (key = $pass)
|
|
|
|
- HMAC-SHA512 (key = $salt)
|
2019-08-07 13:46:21 +00:00
|
|
|
- HMAC-Streebog-256 (key = $pass), big-endian
|
|
|
|
- HMAC-Streebog-256 (key = $salt), big-endian
|
|
|
|
- HMAC-Streebog-512 (key = $pass), big-endian
|
|
|
|
- HMAC-Streebog-512 (key = $salt), big-endian
|
2023-03-04 20:58:11 +00:00
|
|
|
- Amazon AWS4-HMAC-SHA256
|
2019-08-07 13:46:21 +00:00
|
|
|
- CRC32
|
2021-10-02 07:57:16 +00:00
|
|
|
- CRC32C
|
2021-10-09 09:43:04 +00:00
|
|
|
- CRC64Jones
|
2021-05-28 18:06:01 +00:00
|
|
|
- Java Object hashCode()
|
|
|
|
- MurmurHash
|
2021-09-27 20:07:23 +00:00
|
|
|
- MurmurHash3
|
2021-08-29 15:22:59 +00:00
|
|
|
- 3DES (PT = $salt, key = $pass)
|
|
|
|
- DES (PT = $salt, key = $pass)
|
|
|
|
- AES-128-ECB NOKDF (PT = $salt, key = $pass)
|
|
|
|
- AES-192-ECB NOKDF (PT = $salt, key = $pass)
|
|
|
|
- AES-256-ECB NOKDF (PT = $salt, key = $pass)
|
2018-01-30 10:24:21 +00:00
|
|
|
- ChaCha20
|
2021-05-28 18:06:01 +00:00
|
|
|
- Linux Kernel Crypto API (2.4)
|
2021-08-29 15:22:59 +00:00
|
|
|
- Skip32 (PT = $salt, key = $pass)
|
2015-12-04 14:47:52 +00:00
|
|
|
- PBKDF2-HMAC-MD5
|
|
|
|
- PBKDF2-HMAC-SHA1
|
|
|
|
- PBKDF2-HMAC-SHA256
|
|
|
|
- PBKDF2-HMAC-SHA512
|
2019-08-07 13:46:21 +00:00
|
|
|
- scrypt
|
|
|
|
- phpass
|
|
|
|
- TACACS+
|
2022-11-03 20:03:20 +00:00
|
|
|
- DANE RFC7929/RFC8162 SHA2-256
|
2019-08-07 13:46:21 +00:00
|
|
|
- SIP digest authentication (MD5)
|
|
|
|
- IKE-PSK MD5
|
|
|
|
- IKE-PSK SHA1
|
2021-07-24 11:56:49 +00:00
|
|
|
- SNMPv3 HMAC-MD5-96
|
2021-08-29 15:22:59 +00:00
|
|
|
- SNMPv3 HMAC-MD5-96/HMAC-SHA1-96
|
2021-07-20 20:24:35 +00:00
|
|
|
- SNMPv3 HMAC-SHA1-96
|
2021-07-24 16:36:10 +00:00
|
|
|
- SNMPv3 HMAC-SHA224-128
|
2021-08-03 20:02:50 +00:00
|
|
|
- SNMPv3 HMAC-SHA256-192
|
|
|
|
- SNMPv3 HMAC-SHA384-256
|
|
|
|
- SNMPv3 HMAC-SHA512-384
|
2021-05-28 18:06:01 +00:00
|
|
|
- WPA-EAPOL-PBKDF2
|
|
|
|
- WPA-EAPOL-PMK
|
2019-12-19 21:14:42 +00:00
|
|
|
- WPA-PBKDF2-PMKID+EAPOL
|
|
|
|
- WPA-PMK-PMKID+EAPOL
|
2021-05-28 18:06:01 +00:00
|
|
|
- WPA-PMKID-PBKDF2
|
|
|
|
- WPA-PMKID-PMK
|
2023-03-04 20:58:11 +00:00
|
|
|
- IPMI2 RAKP HMAC-MD5
|
2018-01-30 10:24:21 +00:00
|
|
|
- IPMI2 RAKP HMAC-SHA1
|
|
|
|
- CRAM-MD5
|
2023-03-04 20:58:11 +00:00
|
|
|
- MS SNTP
|
2019-08-07 13:46:21 +00:00
|
|
|
- JWT (JSON Web Token)
|
2023-03-04 20:58:11 +00:00
|
|
|
- Radmin3
|
2019-08-07 13:46:21 +00:00
|
|
|
- Kerberos 5, etype 17, TGS-REP
|
|
|
|
- Kerberos 5, etype 17, Pre-Auth
|
2023-03-04 20:58:11 +00:00
|
|
|
- Kerberos 5, etype 17, DB
|
2021-05-28 18:06:01 +00:00
|
|
|
- Kerberos 5, etype 18, TGS-REP
|
2019-08-07 13:46:21 +00:00
|
|
|
- Kerberos 5, etype 18, Pre-Auth
|
2023-03-04 20:58:11 +00:00
|
|
|
- Kerberos 5, etype 18, DB
|
2021-05-28 18:06:01 +00:00
|
|
|
- Kerberos 5, etype 23, AS-REQ Pre-Auth
|
|
|
|
- Kerberos 5, etype 23, TGS-REP
|
|
|
|
- Kerberos 5, etype 23, AS-REP
|
2019-08-07 13:46:21 +00:00
|
|
|
- NetNTLMv1 / NetNTLMv1+ESS
|
2021-08-29 15:22:59 +00:00
|
|
|
- NetNTLMv1 / NetNTLMv1+ESS (NT)
|
2019-08-07 13:46:21 +00:00
|
|
|
- NetNTLMv2
|
2021-08-29 15:22:59 +00:00
|
|
|
- NetNTLMv2 (NT)
|
2023-03-04 20:58:11 +00:00
|
|
|
- Flask Session Cookie ($salt.$salt.$pass)
|
2021-05-28 18:06:01 +00:00
|
|
|
- iSCSI CHAP authentication, MD5(CHAP)
|
2019-08-07 13:46:21 +00:00
|
|
|
- RACF
|
|
|
|
- AIX {smd5}
|
|
|
|
- AIX {ssha1}
|
|
|
|
- AIX {ssha256}
|
|
|
|
- AIX {ssha512}
|
2015-12-04 14:47:52 +00:00
|
|
|
- LM
|
2019-08-07 13:46:21 +00:00
|
|
|
- QNX /etc/shadow (MD5)
|
|
|
|
- QNX /etc/shadow (SHA256)
|
|
|
|
- QNX /etc/shadow (SHA512)
|
2023-03-04 20:58:11 +00:00
|
|
|
- DPAPI masterkey file v1 (context 1 and 2)
|
|
|
|
- DPAPI masterkey file v1 (context 3)
|
|
|
|
- DPAPI masterkey file v2 (context 1 and 2)
|
|
|
|
- DPAPI masterkey file v2 (context 3)
|
2019-08-07 13:46:21 +00:00
|
|
|
- GRUB 2
|
|
|
|
- MS-AzureSync PBKDF2-HMAC-SHA256
|
2018-01-30 10:24:21 +00:00
|
|
|
- BSDi Crypt, Extended DES
|
2019-08-07 13:46:21 +00:00
|
|
|
- NTLM
|
|
|
|
- Radmin2
|
|
|
|
- Samsung Android Password/PIN
|
2021-11-15 15:14:59 +00:00
|
|
|
- Windows Hello PIN/Password
|
2019-08-07 13:46:21 +00:00
|
|
|
- Windows Phone 8+ PIN/password
|
2018-01-30 10:24:21 +00:00
|
|
|
- Cisco-ASA MD5
|
|
|
|
- Cisco-IOS $8$ (PBKDF2-SHA256)
|
|
|
|
- Cisco-IOS $9$ (scrypt)
|
2019-08-07 13:46:21 +00:00
|
|
|
- Cisco-IOS type 4 (SHA256)
|
|
|
|
- Cisco-PIX MD5
|
2020-01-14 16:15:34 +00:00
|
|
|
- Citrix NetScaler (SHA1)
|
|
|
|
- Citrix NetScaler (SHA512)
|
2019-08-07 13:46:21 +00:00
|
|
|
- Domain Cached Credentials (DCC), MS Cache
|
|
|
|
- Domain Cached Credentials 2 (DCC2), MS Cache 2
|
|
|
|
- FortiGate (FortiOS)
|
2021-06-08 09:12:54 +00:00
|
|
|
- FortiGate256 (FortiOS256)
|
2018-01-30 10:24:21 +00:00
|
|
|
- ArubaOS
|
2019-08-07 13:46:21 +00:00
|
|
|
- Juniper IVE
|
|
|
|
- Juniper NetScreen/SSG (ScreenOS)
|
|
|
|
- Juniper/NetBSD sha1crypt
|
2021-07-03 17:03:06 +00:00
|
|
|
- iPhone passcode (UID key + System Keybag)
|
2021-08-29 15:22:59 +00:00
|
|
|
- macOS v10.4, macOS v10.5, macOS v10.6
|
2021-05-28 18:06:01 +00:00
|
|
|
- macOS v10.7
|
|
|
|
- macOS v10.8+ (PBKDF2-SHA512)
|
|
|
|
- bcrypt $2*$, Blowfish (Unix)
|
|
|
|
- md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
|
|
|
|
- descrypt, DES (Unix), Traditional DES
|
2023-03-04 20:58:11 +00:00
|
|
|
- sha1($salt.sha1(utf16le($username).':'.utf16le($pass)))
|
2021-05-28 18:06:01 +00:00
|
|
|
- sha256crypt $5$, SHA256 (Unix)
|
|
|
|
- sha512crypt $6$, SHA512 (Unix)
|
2021-05-06 09:17:28 +00:00
|
|
|
- SQLCipher
|
2019-08-07 13:46:21 +00:00
|
|
|
- MSSQL (2000)
|
|
|
|
- MSSQL (2005)
|
|
|
|
- MSSQL (2012, 2014)
|
2021-05-06 09:17:28 +00:00
|
|
|
- MongoDB ServerKey SCRAM-SHA-1
|
|
|
|
- MongoDB ServerKey SCRAM-SHA-256
|
2019-08-07 13:46:21 +00:00
|
|
|
- PostgreSQL
|
2021-05-28 18:06:01 +00:00
|
|
|
- PostgreSQL CRAM (MD5)
|
2022-06-11 09:35:28 +00:00
|
|
|
- PostgreSQL SCRAM-SHA-256
|
2019-08-07 13:46:21 +00:00
|
|
|
- Oracle H: Type (Oracle 7+)
|
|
|
|
- Oracle S: Type (Oracle 11+)
|
|
|
|
- Oracle T: Type (Oracle 12+)
|
2021-05-06 09:17:28 +00:00
|
|
|
- MySQL $A$ (sha256crypt)
|
2021-05-28 18:06:01 +00:00
|
|
|
- MySQL CRAM (SHA1)
|
2019-08-07 13:46:21 +00:00
|
|
|
- MySQL323
|
|
|
|
- MySQL4.1/MySQL5
|
|
|
|
- Sybase ASE
|
|
|
|
- DNSSEC (NSEC3)
|
2021-05-28 18:06:01 +00:00
|
|
|
- KNX IP Secure - Device Authentication Code
|
2019-08-07 13:46:21 +00:00
|
|
|
- CRAM-MD5 Dovecot
|
|
|
|
- SSHA-256(Base64), LDAP {SSHA256}
|
|
|
|
- SSHA-512(Base64), LDAP {SSHA512}
|
2021-05-28 18:06:01 +00:00
|
|
|
- Dahua Authentication MD5
|
2020-03-03 08:55:13 +00:00
|
|
|
- RedHat 389-DS LDAP (PBKDF2-HMAC-SHA256)
|
2019-08-07 13:46:21 +00:00
|
|
|
- FileZilla Server >= 0.9.55
|
|
|
|
- ColdFusion 10+
|
|
|
|
- Apache $apr1$ MD5, md5apr1, MD5 (APR)
|
|
|
|
- Episerver 6.x < .NET 4
|
|
|
|
- Episerver 6.x >= .NET 4
|
2021-05-28 18:06:01 +00:00
|
|
|
- hMailServer
|
2019-08-07 13:46:21 +00:00
|
|
|
- nsldap, SHA-1(Base64), Netscape LDAP SHA
|
|
|
|
- nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
|
2015-12-04 14:47:52 +00:00
|
|
|
- SAP CODVN B (BCODE)
|
2019-08-07 13:46:21 +00:00
|
|
|
- SAP CODVN B (BCODE) from RFC_READ_TABLE
|
2015-12-04 14:47:52 +00:00
|
|
|
- SAP CODVN F/G (PASSCODE)
|
2019-08-07 13:46:21 +00:00
|
|
|
- SAP CODVN F/G (PASSCODE) from RFC_READ_TABLE
|
2015-12-04 14:47:52 +00:00
|
|
|
- SAP CODVN H (PWDSALTEDHASH) iSSHA-1
|
2019-08-07 13:46:21 +00:00
|
|
|
- PeopleSoft
|
|
|
|
- PeopleSoft PS_TOKEN
|
2019-08-08 09:30:24 +00:00
|
|
|
- SolarWinds Orion
|
2020-12-01 01:38:21 +00:00
|
|
|
- SolarWinds Orion v2
|
2020-12-18 22:21:10 +00:00
|
|
|
- SolarWinds Serv-U
|
2018-01-30 10:24:21 +00:00
|
|
|
- Lotus Notes/Domino 5
|
|
|
|
- Lotus Notes/Domino 6
|
|
|
|
- Lotus Notes/Domino 8
|
2021-06-12 16:38:23 +00:00
|
|
|
- OpenEdge Progress Encode
|
2019-06-22 14:05:02 +00:00
|
|
|
- Oracle Transportation Management (SHA256)
|
2019-08-07 13:46:21 +00:00
|
|
|
- Huawei sha1(md5($pass).$salt)
|
|
|
|
- AuthMe sha256
|
2020-01-16 11:15:17 +00:00
|
|
|
- AES Crypt (SHA256)
|
2021-07-15 17:58:11 +00:00
|
|
|
- VMware VMX (PBKDF2-HMAC-SHA1 + AES-256-CBC)
|
2023-03-04 20:58:11 +00:00
|
|
|
- LUKS v1
|
2019-08-07 13:46:21 +00:00
|
|
|
- VeraCrypt
|
2021-05-06 09:17:28 +00:00
|
|
|
- BestCrypt v3 Volume Encryption
|
2018-06-18 12:38:35 +00:00
|
|
|
- FileVault 2
|
2021-07-17 16:38:04 +00:00
|
|
|
- VirtualBox (PBKDF2-HMAC-SHA256 & AES-128-XTS)
|
|
|
|
- VirtualBox (PBKDF2-HMAC-SHA256 & AES-256-XTS)
|
2019-08-07 13:46:21 +00:00
|
|
|
- DiskCryptor
|
2021-05-06 09:17:28 +00:00
|
|
|
- BitLocker
|
2019-08-07 13:46:21 +00:00
|
|
|
- Android FDE (Samsung DEK)
|
|
|
|
- Android FDE <= 4.3
|
2018-11-12 20:31:01 +00:00
|
|
|
- Apple File System (APFS)
|
2019-08-07 13:46:21 +00:00
|
|
|
- TrueCrypt
|
2021-05-28 18:06:01 +00:00
|
|
|
- eCryptfs
|
2017-12-13 09:39:39 +00:00
|
|
|
- PDF 1.1 - 1.3 (Acrobat 2 - 4)
|
2019-08-07 13:46:21 +00:00
|
|
|
- PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1
|
|
|
|
- PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2
|
2017-12-13 09:39:39 +00:00
|
|
|
- PDF 1.4 - 1.6 (Acrobat 5 - 8)
|
2021-10-14 07:00:07 +00:00
|
|
|
- PDF 1.4 - 1.6 (Acrobat 5 - 8) - user and owner pass
|
2017-12-13 09:39:39 +00:00
|
|
|
- PDF 1.7 Level 3 (Acrobat 9)
|
|
|
|
- PDF 1.7 Level 8 (Acrobat 10 - 11)
|
2019-08-07 13:46:21 +00:00
|
|
|
- MS Office 2007
|
|
|
|
- MS Office 2010
|
|
|
|
- MS Office 2013
|
2021-04-02 09:05:00 +00:00
|
|
|
- MS Office 2016 - SheetProtection
|
2019-08-07 13:46:21 +00:00
|
|
|
- MS Office <= 2003 $0/$1, MD5 + RC4
|
|
|
|
- MS Office <= 2003 $0/$1, MD5 + RC4, collider #1
|
|
|
|
- MS Office <= 2003 $0/$1, MD5 + RC4, collider #2
|
|
|
|
- MS Office <= 2003 $3, SHA1 + RC4, collider #1
|
|
|
|
- MS Office <= 2003 $3, SHA1 + RC4, collider #2
|
2021-05-28 18:06:01 +00:00
|
|
|
- MS Office <= 2003 $3/$4, SHA1 + RC4
|
2018-12-06 17:00:09 +00:00
|
|
|
- Open Document Format (ODF) 1.2 (SHA-256, AES)
|
2019-08-07 13:46:21 +00:00
|
|
|
- Open Document Format (ODF) 1.1 (SHA-1, Blowfish)
|
|
|
|
- Apple Secure Notes
|
2021-05-06 09:17:28 +00:00
|
|
|
- Apple iWork
|
2019-08-07 13:46:21 +00:00
|
|
|
- 1Password, agilekeychain
|
|
|
|
- 1Password, cloudkeychain
|
2018-01-30 10:24:21 +00:00
|
|
|
- Password Safe v2
|
|
|
|
- Password Safe v3
|
|
|
|
- LastPass + LastPass sniffed
|
2019-08-07 13:46:21 +00:00
|
|
|
- KeePass 1 (AES/Twofish) and KeePass 2 (AES)
|
2022-08-21 16:02:35 +00:00
|
|
|
- KeePass 1 (AES/Twofish) and KeePass 2 (AES) - keyfile only mode
|
2021-05-06 09:17:28 +00:00
|
|
|
- Bitwarden
|
2021-05-28 18:06:01 +00:00
|
|
|
- Ansible Vault
|
2021-04-17 19:24:27 +00:00
|
|
|
- Mozilla key3.db
|
|
|
|
- Mozilla key4.db
|
2021-05-06 09:17:28 +00:00
|
|
|
- Apple Keychain
|
2019-08-07 13:46:21 +00:00
|
|
|
- 7-Zip
|
|
|
|
- RAR3-hp
|
2023-03-04 20:58:11 +00:00
|
|
|
- RAR3-p
|
2019-08-07 13:46:21 +00:00
|
|
|
- RAR5
|
2023-03-04 20:58:11 +00:00
|
|
|
- PKZIP
|
2019-08-07 13:46:21 +00:00
|
|
|
- PKZIP Master Key
|
|
|
|
- PKZIP Master Key (6 byte optimization)
|
2020-05-31 08:36:41 +00:00
|
|
|
- SecureZIP AES-128
|
|
|
|
- SecureZIP AES-192
|
|
|
|
- SecureZIP AES-256
|
2023-03-01 11:35:37 +00:00
|
|
|
- Veeam VBK
|
2019-08-07 13:46:21 +00:00
|
|
|
- WinZip
|
|
|
|
- Android Backup
|
2021-04-01 09:14:18 +00:00
|
|
|
- Stuffit5
|
2020-08-12 09:22:37 +00:00
|
|
|
- AxCrypt 1
|
|
|
|
- AxCrypt 1 in-memory SHA1
|
2020-08-14 14:18:29 +00:00
|
|
|
- AxCrypt 2 AES-128
|
|
|
|
- AxCrypt 2 AES-256
|
2021-05-28 18:06:01 +00:00
|
|
|
- iTunes backup < 10.0
|
|
|
|
- iTunes backup >= 10.0
|
2019-08-07 13:46:21 +00:00
|
|
|
- WBB3 (Woltlab Burning Board)
|
|
|
|
- PHPS
|
|
|
|
- SMF (Simple Machines Forum) > v1.1
|
|
|
|
- MediaWiki B type
|
|
|
|
- Redmine
|
2021-05-28 18:06:01 +00:00
|
|
|
- Umbraco HMAC-SHA1
|
2019-08-07 13:46:21 +00:00
|
|
|
- Joomla < 2.5.18
|
|
|
|
- OpenCart
|
|
|
|
- PrestaShop
|
|
|
|
- Tripcode
|
|
|
|
- Drupal7
|
|
|
|
- PunBB
|
|
|
|
- MyBB 1.2+, IPB2+ (Invision Power Board)
|
2021-05-28 18:06:01 +00:00
|
|
|
- vBulletin < v3.8.5
|
|
|
|
- vBulletin >= v3.8.5
|
|
|
|
- bcrypt(md5($pass)) / bcryptmd5
|
|
|
|
- bcrypt(sha1($pass)) / bcryptsha1
|
2023-03-04 20:58:11 +00:00
|
|
|
- bcrypt(sha256($pass)) / bcryptsha256
|
2022-03-02 11:58:28 +00:00
|
|
|
- bcrypt(sha512($pass)) / bcryptsha512
|
2023-03-04 20:58:11 +00:00
|
|
|
- md5(md5($salt).md5(md5($pass)))
|
2021-05-28 18:06:01 +00:00
|
|
|
- osCommerce, xt:Commerce
|
2021-05-06 09:17:28 +00:00
|
|
|
- TOTP (HMAC-SHA1)
|
|
|
|
- Web2py pbkdf2-sha512
|
2019-11-26 16:16:18 +00:00
|
|
|
- Django (PBKDF2-SHA256)
|
|
|
|
- Django (SHA-1)
|
2021-05-28 18:06:01 +00:00
|
|
|
- Atlassian (PBKDF2-HMAC-SHA1)
|
|
|
|
- Ruby on Rails Restful-Authentication
|
2021-08-29 15:22:59 +00:00
|
|
|
- Ruby on Rails Restful Auth (one round, no sitekey)
|
2023-03-04 20:58:11 +00:00
|
|
|
- Python Werkzeug MD5 (HMAC-MD5 (key = $salt))
|
|
|
|
- Python Werkzeug SHA256 (HMAC-SHA256 (key = $salt))
|
2021-06-09 11:19:33 +00:00
|
|
|
- Python passlib pbkdf2-sha512
|
|
|
|
- Python passlib pbkdf2-sha256
|
|
|
|
- Python passlib pbkdf2-sha1
|
2021-05-06 09:17:28 +00:00
|
|
|
- PKCS#8 Private Keys (PBKDF2-HMAC-SHA1 + 3DES/AES)
|
|
|
|
- PKCS#8 Private Keys (PBKDF2-HMAC-SHA256 + 3DES/AES)
|
|
|
|
- JKS Java Key Store Private Keys (SHA1)
|
2023-03-04 20:58:11 +00:00
|
|
|
- GPG (AES-128/AES-256 (SHA-1($pass)))
|
|
|
|
- GPG (AES-128/AES-256 (SHA-512($pass)))
|
|
|
|
- GPG (AES-128/AES-256 (SHA-256($pass)))
|
2021-05-06 09:17:28 +00:00
|
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($0$)
|
|
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($6$)
|
|
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($1, $3$)
|
|
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($4$)
|
|
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($5$)
|
2021-05-28 18:06:01 +00:00
|
|
|
- XMPP SCRAM PBKDF2-SHA1
|
2021-12-19 09:33:06 +00:00
|
|
|
- Teamspeak 3 (channel hash)
|
2021-05-28 18:06:01 +00:00
|
|
|
- Telegram Desktop < v2.1.14 (PBKDF2-HMAC-SHA1)
|
|
|
|
- Telegram Desktop >= v2.1.14 (PBKDF2-HMAC-SHA512)
|
|
|
|
- Telegram Mobile App Passcode (SHA256)
|
|
|
|
- Skype
|
2022-12-27 18:00:37 +00:00
|
|
|
- Anope IRC Services (enc_sha256)
|
2023-03-04 20:58:11 +00:00
|
|
|
- Terra Station Wallet (AES256-CBC(PBKDF2($pass)))
|
|
|
|
- MetaMask Wallet (needs all data, checks AES-GCM tag)
|
|
|
|
- MetaMask Wallet (short hash, plaintext check)
|
|
|
|
- Bisq .wallet (scrypt)
|
2021-06-05 13:32:28 +00:00
|
|
|
- BitShares v0.x - sha512(sha512_bin(pass))
|
2022-06-11 09:44:05 +00:00
|
|
|
- Bitcoin WIF private key (P2PKH)
|
2022-06-25 09:57:51 +00:00
|
|
|
- Bitcoin WIF private key (P2WPKH, Bech32)
|
2023-03-04 20:58:11 +00:00
|
|
|
- Bitcoin WIF private key (P2SH(P2WPKH))
|
2023-01-04 14:52:48 +00:00
|
|
|
- Bitcoin raw private key (P2PKH)
|
|
|
|
- Bitcoin raw private key (P2WPKH, Bech32)
|
2023-03-04 20:58:11 +00:00
|
|
|
- Bitcoin raw private key (P2SH(P2WPKH))
|
|
|
|
- Bitcoin/Litecoin wallet.dat
|
2021-06-05 13:32:28 +00:00
|
|
|
- Electrum Wallet (Salt-Type 1-3)
|
|
|
|
- Electrum Wallet (Salt-Type 4)
|
|
|
|
- Electrum Wallet (Salt-Type 5)
|
|
|
|
- Blockchain, My Wallet
|
|
|
|
- Blockchain, My Wallet, V2
|
|
|
|
- Blockchain, My Wallet, Second Password (SHA256)
|
|
|
|
- Stargazer Stellar Wallet XLM
|
|
|
|
- Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256
|
|
|
|
- Ethereum Wallet, PBKDF2-HMAC-SHA256
|
|
|
|
- Ethereum Wallet, SCRYPT
|
|
|
|
- MultiBit Classic .key (MD5)
|
2021-09-06 17:54:22 +00:00
|
|
|
- MultiBit Classic .wallet (scrypt)
|
2021-06-05 13:32:28 +00:00
|
|
|
- MultiBit HD (scrypt)
|
2021-12-14 12:46:20 +00:00
|
|
|
- Exodus Desktop Wallet (scrypt)
|
2022-10-23 10:24:49 +00:00
|
|
|
- ENCsecurity Datavault (PBKDF2/no keychain)
|
|
|
|
- ENCsecurity Datavault (PBKDF2/keychain)
|
|
|
|
- ENCsecurity Datavault (MD5/no keychain)
|
|
|
|
- ENCsecurity Datavault (MD5/keychain)
|
2023-03-20 11:22:34 +00:00
|
|
|
- SecureCRT MasterPassphrase v2
|
2015-12-04 14:47:52 +00:00
|
|
|
|
|
|
|
##
|
2016-04-29 03:28:49 +00:00
|
|
|
## Attack-Modes
|
2015-12-04 14:47:52 +00:00
|
|
|
##
|
|
|
|
|
2016-04-29 03:28:49 +00:00
|
|
|
- Straight *
|
|
|
|
- Combination
|
|
|
|
- Brute-force
|
|
|
|
- Hybrid dict + mask
|
|
|
|
- Hybrid mask + dict
|
2016-02-04 09:59:13 +00:00
|
|
|
|
2016-04-29 03:28:49 +00:00
|
|
|
* = Supports rules
|
2016-02-04 09:59:13 +00:00
|
|
|
|
|
|
|
##
|
2016-04-29 03:28:49 +00:00
|
|
|
## Supported OpenCL runtimes
|
2015-12-04 14:47:52 +00:00
|
|
|
##
|
|
|
|
|
2016-06-07 16:12:07 +00:00
|
|
|
- AMD
|
2016-04-29 03:28:49 +00:00
|
|
|
- Apple
|
|
|
|
- Intel
|
2016-06-07 16:12:07 +00:00
|
|
|
- NVidia
|
2020-06-03 07:29:20 +00:00
|
|
|
- POCL
|
2020-06-05 07:07:23 +00:00
|
|
|
- ROCm
|
2016-05-10 17:07:07 +00:00
|
|
|
|
|
|
|
##
|
|
|
|
## Supported OpenCL device types
|
|
|
|
##
|
|
|
|
|
|
|
|
- GPU
|
2016-10-29 11:50:43 +00:00
|
|
|
- CPU
|
2016-05-10 17:07:07 +00:00
|
|
|
- APU
|