Some commenters have pointed out this could cause your Google account to be blocked, so please read the terms of service, avoid using any important Google account, and limit using Hashcat to learning hash recovery. - Alex
Such an awesome idea. Extract hashes with your Pi, crack them in the cloud for free. Just remember to use this tool responsibly so Google doesn't crack down on it.
lol good luck with that those passwords are usually so long that a little tesla t4 card from nvidias cloud will probably take like 1000 years to crack also it sounds like a criminal activity
Tired the benchmark command and found the speed way too low.... Speed.#1.........: 345.6 kH/s (296.58ms) @ Accel:512 Loops:500 Thr:32 Vec:1 I did get Colab Pro as well... Any pointers? hashcat (v6.2.5-136-g0c91f6fc0) starting in benchmark mode * Device #1: This hardware has outdated CUDA compute capability (3.7). For modern OpenCL performance, upgrade to hardware that supports CUDA compute capability version 5.0 (Maxwell) or higher. * Device #2: This hardware has outdated CUDA compute capability (3.7). For modern OpenCL performance, upgrade to hardware that supports CUDA compute capability version 5.0 (Maxwell) or higher. nvmlDeviceGetFanSpeed(): Not Supported CUDA API (CUDA 11.2) ==================== * Device #1: Tesla K80, 11382/11441 MB, 13MCU OpenCL API (OpenCL 1.2 CUDA 11.2.109) - Platform #1 [NVIDIA Corporation] ======================================================================== * Device #2: Tesla K80, skipped Benchmark relevant options: =========================== * --workload-profile=4 ------------------------------------------------------------------------------ * Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000] ------------------------------------------------------------------------------ tcmalloc: large alloc 1407451136 bytes == 0x55630a2c0000 @ 0x7f456f6c0001 0x5562e4f4a2a6 0x5562e4f91f3a 0x5562e4f40f9c 0x5562e4f417ec 0x5562e4f3ca3c 0x7f456e8f2bf7 0x5562e4f3ca9a Speed.#1.........: 345.6 kH/s (296.58ms) @ Accel:512 Loops:500 Thr:32 Vec:1 Started: Fri Jan 21 07:36:08 2022 Stopped: Fri Jan 21 07:36:21 2022
Could you run the hashtopolis on multiple instances at once somehow so say 10x Google accounts/tabs open all running hashtopolis to utilize the power of all of them to Crack whatever the master is trying to hash? Aka like a virtual cluster for cracking. If they need Wan for that maybe something like zerotier install to get udp Wan for them.
Nice idea, but i would rather use it for brute force password instead of using a dictionary. Another thing, hash can not be decrypted, it is one direction operation. The page that "decrypt" your password uses a rainbow table (key map).
John 15:11-14 (KJV) These things have I spoken unto you, that my joy might remain in you, and that your joy might be full. This is my commandment, That ye love one another, as I have loved you. Greater love hath no man than this, that a man lay down his life for his friends. Ye are my friends, if ye do whatsoever I command you.
Really disappointed to see Hak5 encouraging service abuse. This will not only discourage google to stop providing free service for data scientists that really need this but support more people to abuse kindness. Also the gpu using in google colab are really bad for hash cracking and also led to your google account getting banned from google colab indefinitely.
That is absolutely brilliant, insanely brilliant, is it fast enough to make bruteforcing wpa .cap files feasable by any chance? I cannot help but wonder how long before google puts a lid on it though
Some commenters have pointed out this could cause your Google account to be blocked, so please read the terms of service, avoid using any important Google account, and limit using Hashcat to learning hash recovery. - Alex
Such an awesome idea. Extract hashes with your Pi, crack them in the cloud for free. Just remember to use this tool responsibly so Google doesn't crack down on it.
Great tutorial with great presenting skills. 👍👍👍
How to connect through SSH for long time usage? Cause after sometime it's disconnect and need to reconnect it but it's start from fresh one
What's the file size limit on uploaded wordlists?
the bash commands are not running on google collab, i am using it on a windows machine. could this be an issue?
There is so much to learn
Hi I just want to learn about cracking wallet password like in crypto.
lol good luck with that those passwords are usually so long that a little tesla t4 card from nvidias cloud will probably take like 1000 years to crack
also it sounds like a criminal activity
Did you install your OS in bare metal ?
You can technically have a linux machine using cloud shell but sure the gpu acceleration in colab gives an advantage in password cracking
That's the whole point.
What about utilizing rule files?
Omg, I cant believe this channel is still posting
sick burn from the creator of "test" with 42 views
Does this work ?
Tired the benchmark command and found the speed way too low.... Speed.#1.........: 345.6 kH/s (296.58ms) @ Accel:512 Loops:500 Thr:32 Vec:1
I did get Colab Pro as well... Any pointers?
hashcat (v6.2.5-136-g0c91f6fc0) starting in benchmark mode
* Device #1: This hardware has outdated CUDA compute capability (3.7).
For modern OpenCL performance, upgrade to hardware that supports
CUDA compute capability version 5.0 (Maxwell) or higher.
* Device #2: This hardware has outdated CUDA compute capability (3.7).
For modern OpenCL performance, upgrade to hardware that supports
CUDA compute capability version 5.0 (Maxwell) or higher.
nvmlDeviceGetFanSpeed(): Not Supported
CUDA API (CUDA 11.2)
====================
* Device #1: Tesla K80, 11382/11441 MB, 13MCU
OpenCL API (OpenCL 1.2 CUDA 11.2.109) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #2: Tesla K80, skipped
Benchmark relevant options:
===========================
* --workload-profile=4
------------------------------------------------------------------------------
* Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000]
------------------------------------------------------------------------------
tcmalloc: large alloc 1407451136 bytes == 0x55630a2c0000 @ 0x7f456f6c0001 0x5562e4f4a2a6 0x5562e4f91f3a 0x5562e4f40f9c 0x5562e4f417ec 0x5562e4f3ca3c 0x7f456e8f2bf7 0x5562e4f3ca9a
Speed.#1.........: 345.6 kH/s (296.58ms) @ Accel:512 Loops:500 Thr:32 Vec:1
Started: Fri Jan 21 07:36:08 2022
Stopped: Fri Jan 21 07:36:21 2022
Same thing happening with me. Don't know the solution yet. Are you able to resolve it? You mind sharing the solution?
Could you run the hashtopolis on multiple instances at once somehow so say 10x Google accounts/tabs open all running hashtopolis to utilize the power of all of them to Crack whatever the master is trying to hash? Aka like a virtual cluster for cracking. If they need Wan for that maybe something like zerotier install to get udp Wan for them.
done and now my acess to colabe is blocked thanks
Any work around for 2500 being deprecated and 2200 not found. All for educational purposes of course. Amazing project btw. Thanks for sharing with us.
Maybe this man likes his hoodie.
Takes real intelligence to use artificial intelligence. Well done!
im getting this error /bin/bash
Great video, looking for you future videos about ssh into it and cracking wifi hash.
Your fan is here for autograph 🙏🏻
@Haķ 5 ADMłN I love it thanks ❤️😀
You Are Great!
wow.....i used colab in my AIML training but this never came In my mind. 🤦🏼♂️ Thanks for this .
@Haķ 5 ADMłN haha im still learning im 2nd year collage student currently pursuing btech degree for AIML.
BTW love from India 🥰🥰🥰🥰🥰🥰🥰🥰
This is neat!
GPU are not allowed anymore, we must have a pro account to use them now
Nice idea, but i would rather use it for brute force password instead of using a dictionary. Another thing, hash can not be decrypted, it is one direction operation. The page that "decrypt" your password uses a rainbow table (key map).
What happened to the good content in 2018?
I love u.
🤦♂️🤦♂️🤦♂️
I'm weak on this..
So do you think MD5 can be reversible encryption? ( 2 ways encryptions )
silly comment, next time pay attention to the video before you jump into the comments
please don't abuse google colab
Yes, this will only create heavy restrictions on all users.
@@cdawson198600 yup
John 15:11-14 (KJV) These things have I spoken unto you, that my joy might remain in you, and that your joy might be full.
This is my commandment, That ye love one another, as I have loved you.
Greater love hath no man than this, that a man lay down his life for his friends.
Ye are my friends, if ye do whatsoever I command you.
Wears a hoody, must be a good hacker.
Nah he hasn't got the mask to go with it
🤤🤤🤤🤤
Really disappointed to see Hak5 encouraging service abuse. This will not only discourage google to stop providing free service for data scientists that really need this but support more people to abuse kindness. Also the gpu using in google colab are really bad for hash cracking and also led to your google account getting banned from google colab indefinitely.
Could you provide more insight into the banning part? A link with the policy would be great
3rd
First?
Please ditch the hoody. It's hard to take someone serious looking like that.
You are why no one wants to make hacking content
That is absolutely brilliant, insanely brilliant, is it fast enough to make bruteforcing wpa .cap files feasable by any chance? I cannot help but wonder how long before google puts a lid on it though
@Lord Winter I think the point is leveraging the cpu power used for the AI simulation, rather than anything secretive about the application itself.
So is it able or not? .cap?
@@fortroadmassive4095 you'd have to turn it to a .hccapx
@@PhilippinesScam Cool thanks
2 nd
Please help report this video. It is shooting every programmer in the foot abusing Google Colab! Extremely Unintelligent!
I don't see anything against reversing your own Hash for educational purposes -K
Awesome vid. But take the hood down. Come on.
Let's focus on the content -K
Thumbnail is off the scale cringe... Can you guys please stop wearing hoodies too...