[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#819459: ITP: hashcat -- Advanced CPU-based password recovery utility,



Package: wnpp
Owner: Daniel Echeverry <epsilon77@gmail.com>
Severity: wishlist

* Package name    : hashcat
* Version         : 2.00
* Upstream Author : Jens Steube
* URL or Web page : http://hashcat.net/hashcat/
* License         : MIT
* Description     : Advanced CPU-based password recovery utility

Hashcat is the self-proclaimed world’s fastest CPU-based password
recovery tool,  Examples of hashcat supported hashing algorithms are
Microsoft LM Hashes, MD4, MD5, SHA-family, Unix Crypt formats, MySQL,
Cisco PIX.

Hashcat offers multiple attack modes for obtaining effective and
complex coverage over a hash's keyspace. These modes are:

* Brute-Force attack
* Combinator attack
* Dictionary attack
* Fingerprint attack
* Hybrid attack
* Mask attack
* Permutation attack
* Rule-based attack
* Table-Lookup attack
* Toggle-Case attack
* PRINCE attack

Other features:

* Multi-Hash (up to 24 million hashes)
* Multi-OS (Linux, Windows and OSX native binaries)
* Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...)
* SSE2 and XOP accelerated
* All Attack-Modes except Brute-Force and Permutation can be extended by rules
* Very fast Rule-engine
* Rules compatible with JTR and PasswordsPro
* Possible to resume or limit session
* Automatically recognizes recovered hashes from outfile at startup
* Can automatically generate random rules
* Load saltlist from external file and then use them in a Brute-Force
Attack variant
* Able to work in an distributed environment
* Specify multiple wordlists or multiple directories of wordlists
* Number of threads can be configured
* Threads run on lowest priority
* Supports hex-charset
* Supports hex-salt
* 90+ Algorithms implemented with performance in mind

Regards

-- 
Daniel Echeverry
http://wiki.debian.org/DanielEcheverry
http://rinconinformatico.net
Linux user: #477840
Debian user


Reply to: