Monday, September 5, 2011

Cryptohaze Multiforcer 1.1 Release (with LM support!)

It's out!

I'm informed it's the world's fastest CUDA LM cracker right now!

The 1.1 is out for Windows, Linux, and OS X.

The big news is LM support.  Close behind is a set of improvements for network support: You can now run the server as only a server (not doing any compute), the clients will now sit and wait for the server if it goes away, and the Windows client no longer crashes the server when it disconnects.

More feature or algorithm requests?  Hang out in the forum!

Or find me on IRC: #cryptohaze on


Multiforcer 1.1
- Fix networking so Windows clients don't crash the server.
- Improve networking support to allow for "perpetual clients"
- Algorithm: sha1(md5($pass)) (SHA1OFMD5)
- Algorithm: md5(sha1($pass)) (MD5OFSHA1)
- Algorithm: md5(md5($pass)) (DOUBLEMD5)
- Algorithm: md5(md5(md5($pass))) (TRIPLEMD5)
- Algorithm: md5($pass.$pass) (DUPMD5)
- Algorithm: ntlm($pass.$pass) (DUPNTLM)
- Algorithm: LM($pass) (LM)
- Add printout of supported hashes to "--help"
- Add hex output option (--hexoutput) to print found passwords in hex.
- Set max password length to maximum hash length if not specified
- Fermi and greater cards now automatically use the large 512MB bitmap.
- Added "--daemon" switch to client mode to not display anything except status and errors.
- Fixed most cases where network clients will have the wrong password len.

The DUPMD5 and DUPNTLM were added to attack password patterns where people just repeat a short password twice to get a long one: "p@$$p@$$" or such.  This may be effective on domains where people have a long password requirement, but don't like remembering it.


No comments:

Post a Comment