
Extreme GPU Bruteforcer-Professional program for recovering passwords from hashes using GPU (GPU). The program supports the following types of hashes: MySQL, MySQL5, DES (Unix), MD4, MD5, MD5 (Unix), MD5 (APR), MD5 (phpBB3), MD5 (Wordpress), NTLM, SHA-1 and many others. On modern graphics cards that support NVIDIA CUDA technology law firm, the program shows great speed-for example, the average speed of forcing password procedure on a video card with an NVIDIA GTS250 is 420 million passwords per second for MD5 hash, 700 million passwords per second MySQL hashes and NTLM hashes 550 million passwords per second.
The program supports different unique types of attacks, including attacks on the mask and dictionary attack, which allow you to quickly create complex passwords! The program also supports the simultaneous operation of multiple graphics cards (up to 32 GPU), which makes it possible for incredible speeds of billions of passwords per second! The maximum number of unsalted hashes, both can work with the program-25,000,000, salted hashes-5,000,000.
Type of hashes average speed (in the attack on a hash on NVIDIA GTS250)
MD5 420 000 000 n/a
MySQL 1.08 billion n/a
MD4 605 000 000 n/a
NTLM 557 000 000 n/a
SHA-1 120 000 000 n/a
MySQL5 66 million p/s
LM 49 million p/s
Domain cached credentials 255 000 000 n/a
MD5 (md5 ($ pass)) 165 000 000 n/a
MD5 ($ pass. $ salt) 180 000 000 n/a
MD5 ($ salt. $ pass) 260 000 000 n/a
MD5 (md5 ($ pass). $ salt) 157 000 000 n/a
MD5 (md5 ($ salt). $ pass) 267 000 000 n/a
MD5 ($ salt. $ pass. $ salt) 240 000 000 n/a
MD5 (md5 ($ pass). $ salt) 90, 000, 000 n/a
MD5 (md5 ($ salt). md5 ($ pass)) 106 000 000 n/a
MD5 (md5 ($ pass). md5 ($ salt)) 106 000 000 n/a
MD5 ($ username. '\ 0'. $ pass) 260 000 000 n/a
SHA1 ($ username. $ pass) 86, 000, 000 n/a
SHA1 (strtolower ($ username). $ pass) 86, 000, 000 n/a
DES (Unix) 1.7 million p/s
MD5 (Unix) 0.16 million p/s
MD5_Half 381 million p/s
MD5_Middle 375 000 000 n/a
MD5_Unicode 400 000 000 n/a
RAdmin v2.x 203 million p/s
For the program must pass the following command line:
A. the name of the .ini file with the settings of the attack. This parameter is optional, because every EXE module uses standard INI file whose name matches the name of the module (e.g. the MD5 module ".exe" uses by default the configuration file "MD5 .ini"), but you can make a few .ini files with different parameters of the attack and in turn transfer to the program.
Two. The name of a text file with hashes. The format string with hash a "one line a hash =". In the distribution of the programme includes test files with examples of hashes. This parameter is optional.
Changes in version 2.0.1:
-The module md5 ($ pass. $ salt). Exe maximum length of the salt is increased to 104 characters.
-Added new modules ripemd320 ($ pass. $ salt). Exe, sha256 ($ $ Pass salt.). Exe, sha512 ($ pass. $ salt). Exe and sha512 ($ $ Pass salt.). Exe.
-Fixed memory leak in the hybrid attack.
-Fixed a bug where the mask is not set minimum and maximum password length.
-Fixed bug with the output from the text of the console to a text file.
The program supports different unique types of attacks, including attacks on the mask and dictionary attack, which allow you to quickly create complex passwords! The program also supports the simultaneous operation of multiple graphics cards (up to 32 GPU), which makes it possible for incredible speeds of billions of passwords per second! The maximum number of unsalted hashes, both can work with the program-25,000,000, salted hashes-5,000,000.
Type of hashes average speed (in the attack on a hash on NVIDIA GTS250)
MD5 420 000 000 n/a
MySQL 1.08 billion n/a
MD4 605 000 000 n/a
NTLM 557 000 000 n/a
SHA-1 120 000 000 n/a
MySQL5 66 million p/s
LM 49 million p/s
Domain cached credentials 255 000 000 n/a
MD5 (md5 ($ pass)) 165 000 000 n/a
MD5 ($ pass. $ salt) 180 000 000 n/a
MD5 ($ salt. $ pass) 260 000 000 n/a
MD5 (md5 ($ pass). $ salt) 157 000 000 n/a
MD5 (md5 ($ salt). $ pass) 267 000 000 n/a
MD5 ($ salt. $ pass. $ salt) 240 000 000 n/a
MD5 (md5 ($ pass). $ salt) 90, 000, 000 n/a
MD5 (md5 ($ salt). md5 ($ pass)) 106 000 000 n/a
MD5 (md5 ($ pass). md5 ($ salt)) 106 000 000 n/a
MD5 ($ username. '\ 0'. $ pass) 260 000 000 n/a
SHA1 ($ username. $ pass) 86, 000, 000 n/a
SHA1 (strtolower ($ username). $ pass) 86, 000, 000 n/a
DES (Unix) 1.7 million p/s
MD5 (Unix) 0.16 million p/s
MD5_Half 381 million p/s
MD5_Middle 375 000 000 n/a
MD5_Unicode 400 000 000 n/a
RAdmin v2.x 203 million p/s
For the program must pass the following command line:
A. the name of the .ini file with the settings of the attack. This parameter is optional, because every EXE module uses standard INI file whose name matches the name of the module (e.g. the MD5 module ".exe" uses by default the configuration file "MD5 .ini"), but you can make a few .ini files with different parameters of the attack and in turn transfer to the program.
Two. The name of a text file with hashes. The format string with hash a "one line a hash =". In the distribution of the programme includes test files with examples of hashes. This parameter is optional.
Changes in version 2.0.1:
-The module md5 ($ pass. $ salt). Exe maximum length of the salt is increased to 104 characters.
-Added new modules ripemd320 ($ pass. $ salt). Exe, sha256 ($ $ Pass salt.). Exe, sha512 ($ pass. $ salt). Exe and sha512 ($ $ Pass salt.). Exe.
-Fixed memory leak in the hybrid attack.
-Fixed a bug where the mask is not set minimum and maximum password length.
-Fixed bug with the output from the text of the console to a text file.
Description: Extreme GPU Bruteforcer 2.0.1
Rating: 4
{ 0 komentar... read them below or add one }
Post a Comment