mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-22 16:18:09 +00:00
514 lines
14 KiB
Plaintext
514 lines
14 KiB
Plaintext
|
|
_____: _____________ _____: -aTZ! _______ ____
|
|
_\ |__\_______ _/_______ _\ |_____ _______\______ /__ ______
|
|
| _ | __ \ ____/____ _ | ___/____ __ |_______/
|
|
|: | .| \ _\____ / | .| \ / \ :| |
|
|
|_____| :|______/ / //____| :|___ //_________| :|
|
|
|_____| /___________/ |_____| /_____/ /_______|
|
|
: : :
|
|
|
|
hashcat v6.2.6
|
|
==============
|
|
|
|
AMD GPUs on Linux require "AMDGPU" (21.50 or later) and "ROCm" (5.0 or later)
|
|
AMD GPUs on Windows require "AMD Adrenalin Edition" (23.7.2 or later) and "AMD HIP SDK" (23.Q3 or later)
|
|
Intel CPUs require "OpenCL Runtime for Intel Core and Intel Xeon Processors" (16.1.1 or later)
|
|
NVIDIA GPUs require "NVIDIA Driver" (440.64 or later) and "CUDA Toolkit" (9.0 or later)
|
|
|
|
##
|
|
## Features
|
|
##
|
|
|
|
- World's fastest password cracker
|
|
- World's first and only in-kernel rule engine
|
|
- Free
|
|
- Open-Source (MIT License)
|
|
- Multi-OS (Linux, Windows and macOS)
|
|
- Multi-Platform (CPU, GPU, APU, etc., everything that comes with an OpenCL runtime)
|
|
- Multi-Hash (Cracking multiple hashes at the same time)
|
|
- Multi-Devices (Utilizing multiple devices in same system)
|
|
- Multi-Device-Types (Utilizing mixed device types in same system)
|
|
- Supports password candidate brain functionality
|
|
- Supports distributed cracking networks (using overlay)
|
|
- Supports interactive pause / resume
|
|
- Supports sessions
|
|
- Supports restore
|
|
- Supports reading password candidates from file and stdin
|
|
- Supports hex-salt and hex-charset
|
|
- Supports automatic performance tuning
|
|
- Supports automatic keyspace ordering markov-chains
|
|
- Built-in benchmarking system
|
|
- Integrated thermal watchdog
|
|
- 300+ Hash-types implemented with performance in mind
|
|
|
|
##
|
|
## Hash-Types
|
|
##
|
|
|
|
- MD4
|
|
- MD5
|
|
- SHA1
|
|
- SHA2-224
|
|
- SHA2-256
|
|
- SHA2-384
|
|
- SHA2-512
|
|
- SHA3-224
|
|
- SHA3-256
|
|
- SHA3-384
|
|
- SHA3-512
|
|
- RIPEMD-160
|
|
- BLAKE2b-512
|
|
- BLAKE2s-256
|
|
- SM3
|
|
- GOST R 34.11-2012 (Streebog) 256-bit, big-endian
|
|
- GOST R 34.11-2012 (Streebog) 512-bit, big-endian
|
|
- GOST R 34.11-94
|
|
- Half MD5
|
|
- Keccak-224
|
|
- Keccak-256
|
|
- Keccak-384
|
|
- Keccak-512
|
|
- Whirlpool
|
|
- CubeCart (Whirlpool($salt.$pass.$salt))
|
|
- SipHash
|
|
- md5(utf16le($pass))
|
|
- sha1(utf16le($pass))
|
|
- sha256(utf16le($pass))
|
|
- sha384(utf16le($pass))
|
|
- sha512(utf16le($pass))
|
|
- BLAKE2b-512($pass.$salt)
|
|
- BLAKE2b-512($salt.$pass)
|
|
- md5($pass.$salt)
|
|
- md5($salt.$pass)
|
|
- md5($salt.$pass.$salt)
|
|
- md5($salt.md5($pass))
|
|
- md5($salt.md5($pass.$salt))
|
|
- md5($salt.md5($salt.$pass))
|
|
- md5($salt.sha1($salt.$pass))
|
|
- md5($salt.utf16le($pass))
|
|
- md5($salt1.sha1($salt2.$pass))
|
|
- md5($salt1.strtoupper(md5($salt2.$pass)))
|
|
- md5(md5($pass))
|
|
- md5(md5($pass).md5($salt))
|
|
- md5(md5($pass.$salt))
|
|
- md5(md5(md5($pass)))
|
|
- md5(md5(md5($pass)).$salt)
|
|
- md5(md5(md5($pass).$salt1).$salt2)
|
|
- md5(sha1($pass))
|
|
- md5(sha1($pass).$salt)
|
|
- md5(sha1($pass).md5($pass).sha1($pass))
|
|
- md5(sha1($pass.$salt))
|
|
- md5(sha1($salt).md5($pass))
|
|
- md5(sha1($salt.$pass))
|
|
- md5(strtoupper(md5($pass)))
|
|
- md5(utf16le($pass).$salt)
|
|
- sha1($pass.$salt)
|
|
- sha1($salt.$pass)
|
|
- sha1($salt.$pass.$salt)
|
|
- sha1($salt.sha1($pass))
|
|
- sha1($salt.sha1($pass.$salt))
|
|
- sha1($salt.sha1(utf16le($username).':'.utf16le($pass)))
|
|
- sha1($salt.utf16le($pass))
|
|
- sha1($salt1.$pass.$salt2)
|
|
- sha1(CX)
|
|
- sha1(md5($pass))
|
|
- sha1(md5($pass).$salt)
|
|
- sha1(md5($pass.$salt))
|
|
- sha1(md5(md5($pass)))
|
|
- sha1(sha1($pass))
|
|
- sha1(sha1($pass).$salt)
|
|
- sha1(sha1($salt.$pass.$salt))
|
|
- sha1(utf16le($pass).$salt)
|
|
- sha256($pass.$salt)
|
|
- sha256($salt.$pass)
|
|
- sha256($salt.$pass.$salt)
|
|
- sha256($salt.sha256($pass))
|
|
- sha256($salt.sha256_bin($pass))
|
|
- sha256($salt.utf16le($pass))
|
|
- sha256(md5($pass))
|
|
- sha256(sha256($pass).$salt)
|
|
- sha256(sha256_bin($pass))
|
|
- sha256(utf16le($pass).$salt)
|
|
- sha384($pass.$salt)
|
|
- sha384($salt.$pass)
|
|
- sha384($salt.utf16le($pass))
|
|
- sha384(utf16le($pass).$salt)
|
|
- sha512($pass.$salt)
|
|
- sha512($salt.$pass)
|
|
- sha512($salt.utf16le($pass))
|
|
- sha512(sha512($pass).$salt)
|
|
- sha512(sha512_bin($pass).$salt)
|
|
- sha512(utf16le($pass).$salt)
|
|
- HMAC-MD5 (key = $pass)
|
|
- HMAC-MD5 (key = $salt)
|
|
- HMAC-RIPEMD160 (key = $pass)
|
|
- HMAC-RIPEMD160 (key = $salt)
|
|
- HMAC-SHA1 (key = $pass)
|
|
- HMAC-SHA1 (key = $salt)
|
|
- HMAC-SHA256 (key = $pass)
|
|
- HMAC-SHA256 (key = $salt)
|
|
- HMAC-SHA512 (key = $pass)
|
|
- HMAC-SHA512 (key = $salt)
|
|
- HMAC-Streebog-256 (key = $pass), big-endian
|
|
- HMAC-Streebog-256 (key = $salt), big-endian
|
|
- HMAC-Streebog-512 (key = $pass), big-endian
|
|
- HMAC-Streebog-512 (key = $salt), big-endian
|
|
- Amazon AWS4-HMAC-SHA256
|
|
- CRC32
|
|
- CRC32C
|
|
- CRC64Jones
|
|
- Java Object hashCode()
|
|
- MurmurHash
|
|
- MurmurHash3
|
|
- 3DES (PT = $salt, key = $pass)
|
|
- DES (PT = $salt, key = $pass)
|
|
- AES-128-ECB NOKDF (PT = $salt, key = $pass)
|
|
- AES-192-ECB NOKDF (PT = $salt, key = $pass)
|
|
- AES-256-ECB NOKDF (PT = $salt, key = $pass)
|
|
- ChaCha20
|
|
- Linux Kernel Crypto API (2.4)
|
|
- Skip32 (PT = $salt, key = $pass)
|
|
- PBKDF2-HMAC-MD5
|
|
- PBKDF2-HMAC-SHA1
|
|
- PBKDF2-HMAC-SHA256
|
|
- PBKDF2-HMAC-SHA512
|
|
- scrypt
|
|
- phpass
|
|
- TACACS+
|
|
- DANE RFC7929/RFC8162 SHA2-256
|
|
- SIP digest authentication (MD5)
|
|
- IKE-PSK MD5
|
|
- IKE-PSK SHA1
|
|
- SNMPv3 HMAC-MD5-96
|
|
- SNMPv3 HMAC-MD5-96/HMAC-SHA1-96
|
|
- SNMPv3 HMAC-SHA1-96
|
|
- SNMPv3 HMAC-SHA224-128
|
|
- SNMPv3 HMAC-SHA256-192
|
|
- SNMPv3 HMAC-SHA384-256
|
|
- SNMPv3 HMAC-SHA512-384
|
|
- WPA-EAPOL-PBKDF2
|
|
- WPA-EAPOL-PMK
|
|
- WPA-PBKDF2-PMKID+EAPOL
|
|
- WPA-PMK-PMKID+EAPOL
|
|
- WPA-PMKID-PBKDF2
|
|
- WPA-PMKID-PMK
|
|
- IPMI2 RAKP HMAC-MD5
|
|
- IPMI2 RAKP HMAC-SHA1
|
|
- CRAM-MD5
|
|
- MS SNTP
|
|
- JWT (JSON Web Token)
|
|
- Radmin3
|
|
- Kerberos 5, etype 17, TGS-REP
|
|
- Kerberos 5, etype 17, Pre-Auth
|
|
- Kerberos 5, etype 17, DB
|
|
- Kerberos 5, etype 17, AS-REP
|
|
- Kerberos 5, etype 18, TGS-REP
|
|
- Kerberos 5, etype 18, Pre-Auth
|
|
- Kerberos 5, etype 18, DB
|
|
- Kerberos 5, etype 18, AS-REP
|
|
- Kerberos 5, etype 23, AS-REQ Pre-Auth
|
|
- Kerberos 5, etype 23, TGS-REP
|
|
- Kerberos 5, etype 23, AS-REP
|
|
- NetNTLMv1 / NetNTLMv1+ESS
|
|
- NetNTLMv1 / NetNTLMv1+ESS (NT)
|
|
- NetNTLMv2
|
|
- NetNTLMv2 (NT)
|
|
- Flask Session Cookie ($salt.$salt.$pass)
|
|
- iSCSI CHAP authentication, MD5(CHAP)
|
|
- RACF
|
|
- AIX {smd5}
|
|
- AIX {ssha1}
|
|
- AIX {ssha256}
|
|
- AIX {ssha512}
|
|
- LM
|
|
- QNX /etc/shadow (MD5)
|
|
- QNX /etc/shadow (SHA256)
|
|
- QNX /etc/shadow (SHA512)
|
|
- DPAPI masterkey file v1 (context 1 and 2)
|
|
- DPAPI masterkey file v1 (context 3)
|
|
- DPAPI masterkey file v2 (context 1 and 2)
|
|
- DPAPI masterkey file v2 (context 3)
|
|
- GRUB 2
|
|
- MS-AzureSync PBKDF2-HMAC-SHA256
|
|
- BSDi Crypt, Extended DES
|
|
- NTLM
|
|
- Radmin2
|
|
- Samsung Android Password/PIN
|
|
- Windows Hello PIN/Password
|
|
- Windows Phone 8+ PIN/password
|
|
- Cisco-ASA MD5
|
|
- Cisco-IOS $8$ (PBKDF2-SHA256)
|
|
- Cisco-IOS $9$ (scrypt)
|
|
- Cisco-IOS type 4 (SHA256)
|
|
- Cisco-PIX MD5
|
|
- Citrix NetScaler (SHA1)
|
|
- Citrix NetScaler (SHA512)
|
|
- Domain Cached Credentials (DCC), MS Cache
|
|
- Domain Cached Credentials 2 (DCC2), MS Cache 2
|
|
- FortiGate (FortiOS)
|
|
- FortiGate256 (FortiOS256)
|
|
- ArubaOS
|
|
- Juniper IVE
|
|
- Juniper NetScreen/SSG (ScreenOS)
|
|
- Juniper/NetBSD sha1crypt
|
|
- iPhone passcode (UID key + System Keybag)
|
|
- macOS v10.4, macOS v10.5, macOS v10.6
|
|
- macOS v10.7
|
|
- macOS v10.8+ (PBKDF2-SHA512)
|
|
- bcrypt $2*$, Blowfish (Unix)
|
|
- md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
|
|
- descrypt, DES (Unix), Traditional DES
|
|
- sha256crypt $5$, SHA256 (Unix)
|
|
- sha512crypt $6$, SHA512 (Unix)
|
|
- SQLCipher
|
|
- MSSQL (2000)
|
|
- MSSQL (2005)
|
|
- MSSQL (2012, 2014)
|
|
- MongoDB ServerKey SCRAM-SHA-1
|
|
- MongoDB ServerKey SCRAM-SHA-256
|
|
- PostgreSQL
|
|
- PostgreSQL CRAM (MD5)
|
|
- PostgreSQL SCRAM-SHA-256
|
|
- Oracle H: Type (Oracle 7+)
|
|
- Oracle S: Type (Oracle 11+)
|
|
- Oracle T: Type (Oracle 12+)
|
|
- MySQL $A$ (sha256crypt)
|
|
- MySQL CRAM (SHA1)
|
|
- MySQL323
|
|
- MySQL4.1/MySQL5
|
|
- Sybase ASE
|
|
- DNSSEC (NSEC3)
|
|
- KNX IP Secure - Device Authentication Code
|
|
- CRAM-MD5 Dovecot
|
|
- SSHA-256(Base64), LDAP {SSHA256}
|
|
- SSHA-512(Base64), LDAP {SSHA512}
|
|
- Dahua Authentication MD5
|
|
- RedHat 389-DS LDAP (PBKDF2-HMAC-SHA256)
|
|
- FileZilla Server >= 0.9.55
|
|
- ColdFusion 10+
|
|
- Apache $apr1$ MD5, md5apr1, MD5 (APR)
|
|
- Episerver 6.x < .NET 4
|
|
- Episerver 6.x >= .NET 4
|
|
- hMailServer
|
|
- nsldap, SHA-1(Base64), Netscape LDAP SHA
|
|
- nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
|
|
- SAP CODVN B (BCODE)
|
|
- SAP CODVN B (BCODE) from RFC_READ_TABLE
|
|
- SAP CODVN F/G (PASSCODE)
|
|
- SAP CODVN F/G (PASSCODE) from RFC_READ_TABLE
|
|
- SAP CODVN H (PWDSALTEDHASH) iSSHA-1
|
|
- RSA Security Analytics / NetWitness (sha256)
|
|
- Adobe AEM (SSPR, SHA-256 with Salt)
|
|
- Adobe AEM (SSPR, SHA-512 with Salt)
|
|
- PeopleSoft
|
|
- PeopleSoft PS_TOKEN
|
|
- NetIQ SSPR (MD5)
|
|
- NetIQ SSPR (PBKDF2WithHmacSHA1)
|
|
- NetIQ SSPR (PBKDF2WithHmacSHA256)
|
|
- NetIQ SSPR (PBKDF2WithHmacSHA512)
|
|
- NetIQ SSPR (SHA-1 with Salt)
|
|
- NetIQ SSPR (SHA-256 with Salt)
|
|
- NetIQ SSPR (SHA-512 with Salt)
|
|
- NetIQ SSPR (SHA1)
|
|
- SolarWinds Orion
|
|
- SolarWinds Orion v2
|
|
- SolarWinds Serv-U
|
|
- Lotus Notes/Domino 5
|
|
- Lotus Notes/Domino 6
|
|
- Lotus Notes/Domino 8
|
|
- OpenEdge Progress Encode
|
|
- Oracle Transportation Management (SHA256)
|
|
- Huawei sha1(md5($pass).$salt)
|
|
- AuthMe sha256
|
|
- AES Crypt (SHA256)
|
|
- VMware VMX (PBKDF2-HMAC-SHA1 + AES-256-CBC)
|
|
- LUKS v1
|
|
- VeraCrypt
|
|
- BestCrypt v3 Volume Encryption
|
|
- FileVault 2
|
|
- VirtualBox (PBKDF2-HMAC-SHA256 & AES-128-XTS)
|
|
- VirtualBox (PBKDF2-HMAC-SHA256 & AES-256-XTS)
|
|
- DiskCryptor
|
|
- BitLocker
|
|
- Android FDE (Samsung DEK)
|
|
- Android FDE <= 4.3
|
|
- Apple File System (APFS)
|
|
- TrueCrypt
|
|
- eCryptfs
|
|
- PDF 1.1 - 1.3 (Acrobat 2 - 4)
|
|
- PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1
|
|
- PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2
|
|
- PDF 1.4 - 1.6 (Acrobat 5 - 8)
|
|
- PDF 1.4 - 1.6 (Acrobat 5 - 8) - user and owner pass
|
|
- PDF 1.7 Level 3 (Acrobat 9)
|
|
- PDF 1.7 Level 8 (Acrobat 10 - 11)
|
|
- MS Office 2007
|
|
- MS Office 2010
|
|
- MS Office 2013
|
|
- MS Office 2016 - SheetProtection
|
|
- MS Office <= 2003 $0/$1, MD5 + RC4
|
|
- MS Office <= 2003 $0/$1, MD5 + RC4, collider #1
|
|
- MS Office <= 2003 $0/$1, MD5 + RC4, collider #2
|
|
- MS Office <= 2003 $3, SHA1 + RC4, collider #1
|
|
- MS Office <= 2003 $3, SHA1 + RC4, collider #2
|
|
- MS Office <= 2003 $3/$4, SHA1 + RC4
|
|
- Open Document Format (ODF) 1.2 (SHA-256, AES)
|
|
- Open Document Format (ODF) 1.1 (SHA-1, Blowfish)
|
|
- Apple Secure Notes
|
|
- Apple iWork
|
|
- 1Password, agilekeychain
|
|
- 1Password, cloudkeychain
|
|
- 1Password, mobilekeychain (1Password 8)
|
|
- Password Safe v2
|
|
- Password Safe v3
|
|
- LastPass + LastPass sniffed
|
|
- KeePass 1 (AES/Twofish) and KeePass 2 (AES)
|
|
- KeePass 1 (AES/Twofish) and KeePass 2 (AES) - keyfile only mode
|
|
- Bitwarden
|
|
- Ansible Vault
|
|
- Mozilla key3.db
|
|
- Mozilla key4.db
|
|
- Apple Keychain
|
|
- 7-Zip
|
|
- RAR3
|
|
- RAR5
|
|
- PKZIP
|
|
- PKZIP Master Key
|
|
- PKZIP Master Key (6 byte optimization)
|
|
- SecureZIP AES-128
|
|
- SecureZIP AES-192
|
|
- SecureZIP AES-256
|
|
- Veeam VBK
|
|
- WinZip
|
|
- Android Backup
|
|
- Stuffit5
|
|
- AxCrypt 1
|
|
- AxCrypt 1 in-memory SHA1
|
|
- AxCrypt 2 AES-128
|
|
- AxCrypt 2 AES-256
|
|
- iTunes backup < 10.0
|
|
- iTunes backup >= 10.0
|
|
- WBB3 (Woltlab Burning Board)
|
|
- PHPS
|
|
- SMF (Simple Machines Forum) > v1.1
|
|
- MediaWiki B type
|
|
- Redmine
|
|
- Umbraco HMAC-SHA1
|
|
- Empire CMS (Admin password)
|
|
- Joomla < 2.5.18
|
|
- OpenCart
|
|
- PrestaShop
|
|
- Tripcode
|
|
- Drupal7
|
|
- PunBB
|
|
- MyBB 1.2+, IPB2+ (Invision Power Board)
|
|
- vBulletin < v3.8.5
|
|
- vBulletin >= v3.8.5
|
|
- bcrypt(md5($pass)) / bcryptmd5
|
|
- bcrypt(sha1($pass)) / bcryptsha1
|
|
- bcrypt(sha256($pass)) / bcryptsha256
|
|
- bcrypt(sha512($pass)) / bcryptsha512
|
|
- md5(md5($salt).md5(md5($pass)))
|
|
- osCommerce, xt:Commerce
|
|
- TOTP (HMAC-SHA1)
|
|
- Web2py pbkdf2-sha512
|
|
- Django (PBKDF2-SHA256)
|
|
- Django (SHA-1)
|
|
- Atlassian (PBKDF2-HMAC-SHA1)
|
|
- Ruby on Rails Restful-Authentication
|
|
- Ruby on Rails Restful Auth (one round, no sitekey)
|
|
- Python Werkzeug MD5 (HMAC-MD5 (key = $salt))
|
|
- Python Werkzeug SHA256 (HMAC-SHA256 (key = $salt))
|
|
- Python passlib pbkdf2-sha512
|
|
- Python passlib pbkdf2-sha256
|
|
- Python passlib pbkdf2-sha1
|
|
- PKCS#8 Private Keys (PBKDF2-HMAC-SHA1 + 3DES/AES)
|
|
- PKCS#8 Private Keys (PBKDF2-HMAC-SHA256 + 3DES/AES)
|
|
- JKS Java Key Store Private Keys (SHA1)
|
|
- GPG (AES-128/AES-256 (SHA-1($pass)))
|
|
- GPG (AES-128/AES-256 (SHA-512($pass)))
|
|
- GPG (AES-128/AES-256 (SHA-256($pass)))
|
|
- GPG (CAST5 (SHA-1($pass)))
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($0$)
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($6$)
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($1, $3$)
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($4$)
|
|
- RSA/DSA/EC/OpenSSH Private Keys ($5$)
|
|
- XMPP SCRAM PBKDF2-SHA1
|
|
- Teamspeak 3 (channel hash)
|
|
- Telegram Desktop < v2.1.14 (PBKDF2-HMAC-SHA1)
|
|
- Telegram Desktop >= v2.1.14 (PBKDF2-HMAC-SHA512)
|
|
- Telegram Mobile App Passcode (SHA256)
|
|
- Skype
|
|
- Anope IRC Services (enc_sha256)
|
|
- Terra Station Wallet (AES256-CBC(PBKDF2($pass)))
|
|
- MetaMask Mobile Wallet
|
|
- MetaMask Wallet (needs all data, checks AES-GCM tag)
|
|
- MetaMask Wallet (short hash, plaintext check)
|
|
- Bisq .wallet (scrypt)
|
|
- BitShares v0.x - sha512(sha512_bin(pass))
|
|
- Bitcoin WIF private key (P2PKH), compressed
|
|
- Bitcoin WIF private key (P2PKH), uncompressed
|
|
- Bitcoin WIF private key (P2WPKH, Bech32), compressed
|
|
- Bitcoin WIF private key (P2WPKH, Bech32), uncompressed
|
|
- Bitcoin WIF private key (P2SH(P2WPKH)), compressed
|
|
- Bitcoin WIF private key (P2SH(P2WPKH)), uncompressed
|
|
- Bitcoin raw private key (P2PKH), compressed
|
|
- Bitcoin raw private key (P2PKH), uncompressed
|
|
- Bitcoin raw private key (P2WPKH, Bech32), compressed
|
|
- Bitcoin raw private key (P2WPKH, Bech32), uncompressed
|
|
- Bitcoin raw private key (P2SH(P2WPKH)), compressed
|
|
- Bitcoin raw private key (P2SH(P2WPKH)), uncompressed
|
|
- Bitcoin/Litecoin wallet.dat
|
|
- Electrum Wallet (Salt-Type 1-3)
|
|
- Electrum Wallet (Salt-Type 4)
|
|
- Electrum Wallet (Salt-Type 5)
|
|
- Blockchain, My Wallet
|
|
- Blockchain, My Wallet, V2
|
|
- Blockchain, My Wallet, Second Password (SHA256)
|
|
- Dogechain.info Wallet
|
|
- Stargazer Stellar Wallet XLM
|
|
- Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256
|
|
- Ethereum Wallet, PBKDF2-HMAC-SHA256
|
|
- Ethereum Wallet, SCRYPT
|
|
- MultiBit Classic .key (MD5)
|
|
- MultiBit Classic .wallet (scrypt)
|
|
- MultiBit HD (scrypt)
|
|
- Exodus Desktop Wallet (scrypt)
|
|
- ENCsecurity Datavault (PBKDF2/no keychain)
|
|
- ENCsecurity Datavault (PBKDF2/keychain)
|
|
- ENCsecurity Datavault (MD5/no keychain)
|
|
- ENCsecurity Datavault (MD5/keychain)
|
|
- SecureCRT MasterPassphrase v2
|
|
|
|
##
|
|
## Attack-Modes
|
|
##
|
|
|
|
- Straight *
|
|
- Combination
|
|
- Brute-force
|
|
- Hybrid dict + mask
|
|
- Hybrid mask + dict
|
|
|
|
* = Supports rules
|
|
|
|
##
|
|
## Supported OpenCL runtimes
|
|
##
|
|
|
|
- AMD
|
|
- Apple
|
|
- Intel
|
|
- NVidia
|
|
- POCL
|
|
- ROCm
|
|
|
|
##
|
|
## Supported OpenCL device types
|
|
##
|
|
|
|
- GPU
|
|
- CPU
|
|
- APU
|