v0.1.0
Pre-releaseGPUCrack 0.1.0
Features
- 7 character NTLM rainbow table generation on GPU, with adjustable number of end points (mt)
- Online attack on CPU
- Tables are generated as non-compressed text files (one file for start points, one file for end points)
How to build
-
Download GPUCrack_0.1.0.tar.xz and extract it. It is also recommended to download t50_files.tar.xz in order to test the program with pre-generated tables. If you download t50_files.tar.xz, extract it at the root of where you extracted GPUCrack_0.1.0.tar.xz.
-
Open a terminal in GPUCrack_0.1.0, and run:
cmake .
If it prompts you with this error:
CMake Error at CMakeLists.txt:2 (project):
No CMAKE_CUDA_COMPILER could be found.
Tell CMake where to find the compiler by setting either the environment
variable "CUDACXX" or the CMake cache entry CMAKE_CUDA_COMPILER to the full
path to the compiler, or to the compiler name if it is in the PATH.
Then you need to find where nvcc
is located in your machine. In this example, it is located at /usr/local/cuda/bin/nvcc
Once you've located it, execute this command (replace /usr/local/cuda/bin/nvcc
by the path to your nvcc
) :
cmake -DCMAKE_CUDA_COMPILER:PATH=/usr/local/cuda/bin/nvcc .
- Then:
cmake --build .
How to use
To generate a table of 7 character passwords (offline attack), execute this command:
./generateTable mt
where mt is the number of end points in the table.
This will create two files: testStart.txt
and testEnd.txt
. These files contain the start points and the end points.
Please be aware that in this release, writing the start and end points files takes a lot of time.
You can see what they look like by executing these commands:
head testStart.txt
head testEnd.txt
To crack a password (online attack), you can either use the files you just generated or the ones provided (t50_start.txt
and t50_end.txt
). Their parameters are mt=10415000 and t=50. The chain length is very small, so do not expect to crack a lot of passwords with it.
Usage:
./online testStart.txt testEnd.txt -p PLAIN_7CHAR_PASSWORD
or ./online testStart.txt testEnd.txt -h NTLM_HASH_OF_7CHAR_PWD
For example, with the provided files:
./online t50_start.txt t50_end.txt -p CyiFaaa
--> Will hash the password CyiFaaa
and then try to crack its hash.
./online t50_start.txt t50_end.txt -h 552D8E284B76800028EC10765D506168
--> Will try to crack the NTLM hash 552D8E284B76800028EC10765D506168
If an error like "*** stack smashing detected ***: terminated Aborted (core dumped)"
appears into the console, just ignore it for now.