New version of hashcat is out. Time to test version 6.2.0 @HASHCAT #LINUX4HACKERS #HASHCAT #LINUX #INFOSEC #HACKING #PENTEST #PENTESTING #REDTEAM #NVIDA #BRUTEFORCE #NVIDA #TESLAM60

Hi all!

There is a new version of Hashcat out for you to try! Here you can download it https://hashcat.net/hashcat/

312 different algorithms to use. The different attack modes are: Straight, Combination, Brute-force, Hybrid dict + mask, Hybrid mask + dict and Association

Fixes

There is 26 bugfixes in this release.

New attack mode:

Association Attack (aka “Context Attack”) to attack hashes from a hashlist with associated “hints”

New algorithms:

Apple iWork
AxCrypt 2 AES-128
AxCrypt 2 AES-256
BestCrypt v3 Volume Encryption
Bitwarden
Dahua Authentication MD5
KNX IP Secure – Device Authentication Code
MongoDB ServerKey SCRAM-SHA-1
MongoDB ServerKey SCRAM-SHA-256
Mozilla key3.db
Mozilla key4.db
MS Office 2016 – SheetProtection
PDF 1.4 – 1.6 (Acrobat 5 – 8) – edit password
PKCS#8 Private Keys
RAR3-p (Compressed)
RAR3-p (Uncompressed)
RSA/DSA/EC/OPENSSH Private Keys
SolarWinds Orion v2
SolarWinds Serv-U
SQLCipher
Stargazer Stellar Wallet XLM
Stuffit5
Telegram Desktop >= v2.1.14 (PBKDF2-HMAC-SHA512)
Umbraco HMAC-SHA1
sha1($salt.sha1($pass.$salt))
sha1(sha1($pass).$salt)

Here is a sample of bench-marking test in my rig.

./hashcat.bin -b

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.