Closed Console closed 6 years ago
Does this also occur when using the Speedtest benchmark or do you see this on only the Runtime benchmark?
Only tested runtime so far, but will switch to speedtest and report back.
So looked into this some more. Looking at the command used for benchmarking it clearly re-covers the space when it begins the cracking job. So I don't think this is related to actual benchmarking, it was just a happy coincidence.
I think its the same issue as the lad with the DCC2 hashes is experiencing (https://github.com/s3inlc/hashtopussy/issues/206), as we've just experienced it again with another KRB TGS (13100) hash btw I did put a bodge in the code to expand the database field for hashes as we're routinely hitting 2600 character+ krb tgs tickets - bodge listed in detail here: (https://github.com/s3inlc/hashtopussy/issues/184) just in case that's the cause of my issues.
Chunk shows as "cracked" but the hashlist is not showing the cracked password and other agents continue to crack while the agent that cracked the hash errors with a "hashfile is empty or corrupt" it was a single hash however so that's to be expected as locally it has removed it from its hashfile.
Thankfully the chunk shows as cracked so we were able to find the password manually by subbing in the -s and -l values provided on the chunk activity page.
I know it's some time ago since this happened, but I think I might finally know the reason causing this. In this case it would be a connection of two smaller not ideal things on the server. As there might have an error happened during the submission of the hash, it was able to update the chunk and the hashlist counters, but not saving the plain in the hashes. In the old version the transactions were not handled correctly inside the DBA, so if a part failed, the applied changes were not rollback. I assume that this could be the reason for this special behaviour. It would be good, if you later then could run it with the upcoming 0.5.0 version and check if this ever happens again.
As this issue is sitting here for a longer time and there was a huge code change since, I close this issue now. Most likely this issue is related to the hash length issues.
If the issue still persists with the newest version, please reopen.
Currently testing an SPN hash (13100) with a standard rockyou.txt and dive tasking. The password is known to be:
AsdfJkl;
This works when calling hashcat manually using the details in the job.
./hashcat/hashcat64.bin -a0 ./hashlists/24 -r ./files/dive.rule ./files/rockyou.txt -m 13100
And successfully cracks the password in seconds, however a distributed job involving 1 to 6 hosts over the entire task fails to successful register a crack and i've re-run the task multiple times.
Closer inspection suspecting something was up with the benchmarking process as it was completing incredibly fast, revealed that the benchmark command:
sudo /home/xxxx/xxxx-hashtopussy/hashcat/hashcat64.bin --force -w2 --hash-type=13100 -a0 "/home/xxxx/xxxx-hashtopussy/hashlists/26" -r "/home/xxxx/xxxx-hashtopussy/files/dive.rule" "/home/xxxx/xxxx-hashtopussy/files/rockyou.txt" --runtime=30 --restore-disable --potfile-disable --session=hashtopussy --weak=0
*note I removed the --machine-readable.Was actually cracking the hash within the first second of the benchmark.
hashcat (v3.6.0) starting...
OpenCL Platform #1: Intel(R) Corporation
Hashes: 1 digests; 1 unique digests, 1 unique salts Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates Rules: 99086
Applicable optimizers:
Watchdog: Hardware monitoring interface not found on your system. Watchdog: Temperature abort trigger disabled. Watchdog: Temperature retain trigger disabled.
Dictionary cache hit:
$krb5tgs$23$xxxx.xxxx$xxxx.xxxx$xxxx/xxxx_xxxx.xxxx.xxxx:1433$0815c0f53786fc7d32d38bff0c5bc50a$db3c62d7a3d69...SNIP...2644351ab0171f5479cefa3:AsdfJkl;
Session..........: hashtopussy Status...........: Cracked Hash.Type........: Kerberos 5 TGS-REP etype 23 Hash.Target......: $krb5tgs$23$*xxxx.xxxx$xxxx.xxxx$xxxx/xxxx...xxxx Time.Started.....: Fri Jun 30 09:48:35 2017 (1 sec) Time.Estimated...: Fri Jun 30 09:48:36 2017 (0 secs; Runtime limited: 29 secs) Guess.Base.......: File (/home/xxxx/xxxx-hashtopussy/files/rockyou.txt) Guess.Mod........: Rules (/home/xxxx/xxxx-hashtopussy/files/dive.rule) Guess.Queue......: 1/1 (100.00%) Speed.Dev.#1.....: 2946.5 kH/s (7.27ms) Recovered........: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts Progress.........: 2457600/722948300620 (0.00%) Rejected.........: 0/2457600 (0.00%) Restore.Point....: 0/7296170 (0.00%) Candidates.#1....: 1234567 -> hORoScope HWMon.Dev.#1.....: N/A
Started: Fri Jun 30 09:48:33 2017 Stopped: Fri Jun 30 09:48:36 2017
Which meant the benchmark was completed within 1 second of starting, not lasting the full 30 seconds.
I'm not sure if this is causing the issue but its certainly an odd behaviour.
Here is some more debug output from hashtopussy earlier when trying to debug the task, as you can see it still runs the command just fine and appears to return a H/S figure and completes chunks. Just never registers a successful crack.
NB: Yes this is using my laptop, we're experiencing exactly the same behaviour on our GPU powered rigs.