Cracking password hashes SUPER FAST and FREE ! (Penglab & Google Colab)

Поділитися
Вставка
  • Опубліковано 8 лис 2024

КОМЕНТАРІ • 128

  • @superhero1
    @superhero1  6 місяців тому

    According to some comments, this no longer works and should be avoided to not risk a ban. Keeping the video up for the good old times. Stay curious!

    • @minhphuc5444
      @minhphuc5444 5 місяців тому

      do you know any new way without getting banned, my account has been banned

  • @michaelgirma6161
    @michaelgirma6161 3 роки тому +9

    I always wondered if i could use colab for cracking hashes when i used to take ML courses. Great tip.

  • @cbesc
    @cbesc Рік тому +2

    You are living up to your channel name. Thanks for the tip on collab!

  • @AvinashKumar-fe8xb
    @AvinashKumar-fe8xb 2 роки тому +3

    Me: Wow! why did i not think about using colab to crack hashes. Super useful :)

  • @Azeem_Idrisi
    @Azeem_Idrisi 3 роки тому +2

    The only guy on UA-cam who tell about this. Thanks ❤️👍🏻

  • @Gabubu_WADs
    @Gabubu_WADs 3 роки тому +5

    I tried and because of their GPU limitations I can't get the final code. So, it's more for decrypting simple hashes i think. 🤔

    • @superhero1
      @superhero1  3 роки тому +1

      Which hash type did you try?

  • @4ag2
    @4ag2 4 роки тому +1

    First 😎
    Big Up my brother 💯

  • @Elhalafawy123
    @Elhalafawy123 2 роки тому +1

    This extremely good and fast to know the password inside handshake file

  • @milkcoffee-h8g
    @milkcoffee-h8g 5 місяців тому

    You don't use raw handshake file, you type the word first and expect the machine to work on that superhero1 word

  • @ringtonewali9172
    @ringtonewali9172 Рік тому +1

    How connect through SSH? please guide me after sometime it disconnect and I need to reconnect and it's start from begain

    • @superhero1
      @superhero1  Рік тому +1

      Sorry, I cannot offer individual support here but it sounds like Google Collab is limited for specific user cases.

  • @lafish4308
    @lafish4308 3 роки тому +1

    I love you man!!! this is so helpful

  • @blackout5758
    @blackout5758 3 роки тому +5

    32kH/s is pretty low. You can reach 800kH/s with gpu cloud computing easily

    • @superhero1
      @superhero1  3 роки тому +4

      For free?

    • @Rhidayah
      @Rhidayah 3 роки тому

      If you say that you just borrow GTX or RTX GPU to get 40gH/s

    • @hasanmujeeb8922
      @hasanmujeeb8922 3 роки тому

      @blackout where ?

    • @blackout5758
      @blackout5758 3 роки тому +2

      @@hasanmujeeb8922 linode gpu nodes for example

  • @sabidibnejesan3682
    @sabidibnejesan3682 Рік тому +1

    How can i decrypt a hc22000 file in penglab?

  • @kayloko6633
    @kayloko6633 2 роки тому

    hey, i managed to find all these infos on my own but great video, but my colab session keeps disconecting at random moment at about 10 to 15min from start even in the middle or hashing, not the "while True:pass" method nor the javascript click delay method work, i'm on it for 2 days now, is there a FKNG solution as 08/2022 ??

  • @theblowupdollsmusic
    @theblowupdollsmusic 2 роки тому +1

    Great tutorial. Did you use Colab pro for this? Or was it the free teir?

  • @erikw9226
    @erikw9226 10 місяців тому

    Can you explain how to find the hash from an encrypted USB drive. Thank you!

  • @friend1439
    @friend1439 3 роки тому +2

    Hello Sir
    I have password protected rar file and i lost the password.
    How can i unlock it using google colab?
    I'm new to google colab.

    • @superhero1
      @superhero1  3 роки тому

      Get the hash and crack the hash. There is more details on Google. This video just shows how to crack a hash for educational purposes.

  • @STOKfredrik
    @STOKfredrik 4 роки тому +2

    😍😍😍😍😍

  • @alicomando1195
    @alicomando1195 2 роки тому +1

    I don't know why Google
    Offers google colab session last only for 6 minutes
    6 month ago it worked for one hour
    Do you have any solution?
    Is there any free alternatives besides google colab?

    • @superhero1
      @superhero1  2 роки тому

      Sorry, it's been a while since I used this and now I have a strong graphics card in my Desktop to do most CTF stuff.

  • @safarmansoor6967
    @safarmansoor6967 3 роки тому +3

    Hi, how to upload wpa hccapx file in hashcat using colab? 🥺

  • @kievcalungsod9434
    @kievcalungsod9434 2 роки тому

    You are awesome!

  • @alicomando1195
    @alicomando1195 Рік тому +1

    Google doesn't Allow password cracking
    Any more
    It worked before but now
    Whenever you hit run and click run
    It stops immediately
    At 2:44
    Sad 😔

    • @MandelaoDigital
      @MandelaoDigital 7 місяців тому

      for me it's working... you need to upgrade your gpu machine

  • @faisallrathore
    @faisallrathore 4 роки тому +1

    Awesome.

  • @pentesterlabs
    @pentesterlabs 9 місяців тому +1

    my google colab account suspended thank u🙏

  • @satish7028
    @satish7028 Місяць тому

    Is it possible for sha256 hash decrypt

  • @muhamedrailasi242
    @muhamedrailasi242 Рік тому

    @superhero1 I followed your instructions step by step and it always says : word "true" is not defined . (?)

    • @superhero1
      @superhero1  Рік тому

      Sounds like you have a tiny error in the config part. Maybe you need to capitalize it?

  • @adelhatim8102
    @adelhatim8102 3 роки тому +1

    thaank you brother but some time it gives me cannot connect to GPU backend so what I can do for that and also can you tell as about how can i enter any data base for any social media account to get an a hash or get any Gmail > waiting for your response much more then any thing

  • @tanishqb385
    @tanishqb385 Рік тому

    can this be used for breaking wpa2 handshakes?

  • @jwhicks123
    @jwhicks123 2 роки тому +1

    can you edit this so that it doesn t need wordlists just uses char list and runs through the combinations

    • @superhero1
      @superhero1  2 роки тому

      Just change the command line in the last step then

    • @miketyson1717
      @miketyson1717 10 місяців тому

      ​@@superhero1yeah that's the problem I've noticed in the comments is a complete lack of understanding and thinking of people following this as if it's a recipe not an example... I find it easier to learn when taught how to learn, where to look,
      man hashcat
      Or hashcat --help

  • @jugalmodi4426
    @jugalmodi4426 Рік тому +1

    Is this mathod is cracking a cap file or cracking a hccap file ??

    • @superhero1
      @superhero1  Рік тому

      You will have to change it a little in order to work with files. Also I am not sure how stable this is to run inside Google Colab. It might timeout.

  • @docmalitt
    @docmalitt 4 роки тому +1

    Cooool!!! Thx... nice tool.

  • @xMAxAllx
    @xMAxAllx 2 роки тому

    Hello, why I automatically disconnected when shells setting up? when I reconnect I need run all again and when its again disconnect((

    • @superhero1
      @superhero1  2 роки тому +1

      Unfortunately, you will have to troubleshoot that yourself. But if you have a question related to the video feel free to post it.

  • @TheCrappyPC-pg1bc
    @TheCrappyPC-pg1bc Рік тому +1

    no longer works 😭

  • @davidaw104
    @davidaw104 2 роки тому

    I don't understand. So we can't clone the package onto our linux console utilizing our gpu? I was thinking how can I use aws ec2 to run brute force attack

    • @superhero1
      @superhero1  2 роки тому

      Sorry, I don't understand your question.

    • @galloe
      @galloe 8 місяців тому

      Your question is confusing. This repository is designed to crack passwords using a remote GPU via Google Cloud. If you have a good GPU, then you wouldn't need this repository in the first place, you could just run Hashcat on your bare metal host system. AWS does have a similar service, but I don't think it's free.
      The other confusing part is that you said that you're trying to figure out how to "use aws ec2 to run brute force attack," but you also want to use your own GPU. So which is it? Do you want to use your own GPU, or do you want to crack passwords through the cloud?

  • @evilsparrow0474
    @evilsparrow0474 3 роки тому +3

    Hello superhero! Suppose I have an hash password for my .rar file and I need to crack it up using this, I don't remember my number of characters being used or any clue regarding it. Also at 4:36, you have been providing the password along the line of code. So, if this software demands us to provide the right password and we don't know it, how can I use it? It's for educational purposes :)

    • @superhero1
      @superhero1  3 роки тому +1

      Hi evilsparrow, at 4:36 I just create the example hash. If your password is not in rockyou.txt you would have to use a different approach maybe rockyou+best64 - it helps to know which patterns are used and what character set. I just pass the hash in the command line for convenience. You can also store it in a file. For cracking rar files Google actually shows good tutorials on how to do it.

    • @electrowizard2658
      @electrowizard2658 10 місяців тому

      use jhon to extract the hash of it forst then save it in afile and then crack it easy as f

    • @mobilesales4696
      @mobilesales4696 2 місяці тому

      Need a tutorial 😂​@@electrowizard2658

  • @raginibhayana8305
    @raginibhayana8305 Рік тому

    how do i input a txt file to get decrypted?

  • @koliplayz
    @koliplayz 11 місяців тому

    can we use custom file like wpa_hanshake.hc2000 and how?

  • @rahulnirmesh3388
    @rahulnirmesh3388 2 роки тому

    If I provide you my hash, will you try running it? Because it is really taking me lot of time.

    • @superhero1
      @superhero1  2 роки тому +1

      Hi Rahul, please understand that I cannot offer any kind of service to do that. Cheers, superhero1

    • @rahulnirmesh3388
      @rahulnirmesh3388 2 роки тому

      Yes I do understand. It's just because I have few hashes which is not crackable. Even tried with 30+ professionals (one with 24 years of experience including 15 years into Microsoft Symantec Team), so I thought if someone would like to challenge themselves.
      But thanks anyways for your reply 😊

    • @rahulnirmesh3388
      @rahulnirmesh3388 2 роки тому

      @@superhero1 Hi, I do have a question though.
      Is Google Colab capable of cracking extremely messed up hash? Is it worth taking a shot?

    • @rahulnirmesh3388
      @rahulnirmesh3388 2 роки тому

      @@HCShuffle yes. The kind of hash no one is able to decrypt it by using some tools or Kali (don't even know what else more) but yeah, everyone is like "This is extremely messed up" (not sure what that mean)

  • @alixerkmir2097
    @alixerkmir2097 Рік тому

    how can I do this "hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 12 ?d?d?d?d?d?d?d?d?d?d?d?d" in 5:48?

  • @jinupatel0_0eth09
    @jinupatel0_0eth09 4 роки тому +1

    ❤️❤️

  • @chamodsachintha3095
    @chamodsachintha3095 2 роки тому +1

    How to connect to ssh i enabled SSH before run the script.?

    • @superhero1
      @superhero1  2 роки тому

      Yes

    • @chamodsachintha3095
      @chamodsachintha3095 2 роки тому

      What is the command i should run on my computer..? What is the ip

    • @superhero1
      @superhero1  2 роки тому +1

      @@chamodsachintha3095 You find more info here: github.com/demotomohiro/remocolab/blob/master/README.md

    • @superhero1
      @superhero1  2 роки тому

      At the end it will display the command after: Command to connect to the ssh server:
      ssh -o UserKnownHostsFile=/dev/null -o VisualHostKey=yes -oProxyCommand="cloudflared access ssh --hostname %h" colab@............trycloudflare.com

    • @chamodsachintha3095
      @chamodsachintha3095 2 роки тому

      Yah first i copy and past it on my terminal nothing happened 🤔 then i realized i don't have Cloudflare installed 😅 after installing Cloudflare it worked 🤘🤘🤘
      Thank you so much for replying sir.
      Stay safe ♥️

  • @gc82
    @gc82 10 місяців тому

    How many passwords per sec u think it does

  • @gqneshcha2044
    @gqneshcha2044 2 роки тому

    how to crack a file with this how do i add files on the collab please make another video

  • @abdomuhammad9988
    @abdomuhammad9988 8 місяців тому

    I got banned from Google Colab 😢

  • @chaayino1766
    @chaayino1766 2 роки тому

    can we find a rar file password using the hash that hashcat or john the ripper generated for us?

    • @superhero1
      @superhero1  2 роки тому

      Theoretically it works here as well but you are better off doing this on AWS with paid instances that have more compute power using high-end GPUs.

  • @ivankostark5583
    @ivankostark5583 Рік тому +1

    This using wordlists. I need without wordlists

    • @superhero1
      @superhero1  Рік тому

      Then adjust the command :-)

    • @ivankostark5583
      @ivankostark5583 Рік тому

      @@superhero1 bro i don't want dictionary or brute force attack bro

    • @ivankostark5583
      @ivankostark5583 Рік тому

      @@superhero1 i want password cracking without dictionary or brute force. Anything possible? What about fluxion ??

  • @RandomDude...
    @RandomDude... 3 роки тому

    Google colab says that I reached my GPU limit without even using it !

  • @MidasGoldKing
    @MidasGoldKing 3 роки тому

    Nice video thank you, but the google rdp lasts for only 1 hour and half then it s offline and you have to re-create another one, how to fix this google limittion ?

  • @tuvshinbatsundui837
    @tuvshinbatsundui837 3 роки тому

    what if own wordlist or create it in cloud suing crunch?etc

    • @superhero1
      @superhero1  3 роки тому

      Then you need to adapt the script to download your wordlist

  • @woolfy02
    @woolfy02 3 роки тому

    Can you help me with formatting my hash file? I posted it but not sure if it posted so you could see it.

    • @superhero1
      @superhero1  3 роки тому

      Hi I don’t see it. Unfortunately, I do not offer 1:1 support here.

    • @woolfy02
      @woolfy02 3 роки тому

      @@superhero1 I was finally able to get it figured out but Google Colab never connects to the GPU regardless. Even after I bought the 'Pro' version. What a joke.

    • @superhero1
      @superhero1  3 роки тому

      @@woolfy02 Very weird can you not select GPU as runtime?

  • @outsiderlost
    @outsiderlost 3 роки тому

    At first it worked then I received this nice message: "Unable to connect GPU".

    • @superhero1
      @superhero1  3 роки тому

      Maybe a temporary issue

    • @outsiderlost
      @outsiderlost 3 роки тому

      @@superhero1
      "Due to limitations in the Colab manual, it is not possible to connect a GPU at this time."
      This problem can be caused by the constraints of the my region..

  • @amitminz1
    @amitminz1 8 місяців тому

    can i use this method to recover rar file password???

  • @evikasvarshney
    @evikasvarshney 4 роки тому +2

    Thanks..

  • @kievcalungsod9434
    @kievcalungsod9434 2 роки тому +1

    Hi bro! Can you make a video that can crack an e-wallet password? I can't recover my password because I forgot it. Hope you notice me! Thanks.

    • @superhero1
      @superhero1  2 роки тому

      Hi I usually read all my comments. It is not that easy to recover. Usually BIP-39 uses 2048 words ^ 24 so in our lifetime we probably don’t see that seed cracked.

    • @superhero1
      @superhero1  2 роки тому

      However the password for a file can probably be cracked if you know what set of characters you used or common words that could be enough for a custom attack. But I would not discuss that in public. You can reach me on Twitter.

  • @Soulvesster
    @Soulvesster 3 роки тому

    how to do that line sir

  • @kidsgaming3461
    @kidsgaming3461 4 місяці тому

    he is showing by creating a hash of a simple password and cracking it

  • @D3rMesaa
    @D3rMesaa 3 роки тому +1

    lol what
    neighbours wifi here I come haha

  • @anubhav9532
    @anubhav9532 Рік тому

    Can a password hash be decrypted?

    • @Sharpless2
      @Sharpless2 Рік тому

      no. They will detect and ban you from Colab in less than 5 minutes. For cracking hashes, either rent cloud gpu's (at the very least 6 to 8 4090's for at least 3-4 months depending on what kind of hash) or build a cracking rig yourself and realize that renting gpu's is the better way. Let me already say this upfront: If youre trying to crack a 7z SHA256 AES hash; dont bother. Thats the algorith that protects bank accounts and is most likely even quantum computer proof.

    • @anubhav9532
      @anubhav9532 Рік тому

      @@Sharpless2 WPA 2

    • @itznikhilll
      @itznikhilll Рік тому

      ​@@Sharpless2Can you decrypt wpa2 hash?

    • @unknown12286
      @unknown12286 11 місяців тому

      ​@@Sharpless2 bro do you know how to crack sha 1

    • @Sharpless2
      @Sharpless2 11 місяців тому

      @@itznikhilll aircrack ng. WPA2 is difficult to crack for the average joe. Best you can do is learn about it. I never had any use for wpa2 cracking.

  • @YouTube.survivor
    @YouTube.survivor Рік тому

    Hi brother 👋. I've lost the recovery key of my Crypto wallet. Can I get help from your tutorial? Please let me know.

    • @superhero1
      @superhero1  Рік тому

      No. If you don’t have your seed phrase this will not help. Sorry.

  • @syedhussain2701
    @syedhussain2701 3 роки тому

    Hello bro can u plz give me like a lesson on how to get hashes and then crack them, like on discord or something with screen share

    • @superhero1
      @superhero1  3 роки тому

      You should only do that for educational purposes and can do so in lab environments that are especially setup for that purpose. I don’t support any illegal activities.

    • @syedhussain2701
      @syedhussain2701 3 роки тому +1

      @@superhero1 I wanna know for educational purposes

    • @superhero1
      @superhero1  3 роки тому

      I do offer 1:1 sessions, but for 45mins you should know what you want to learn. Maybe you start watching my stream? It’s free.

  • @tiagovla
    @tiagovla Рік тому

    This is so useless. And 32k#/s is slow.

  • @tekken-pakistan2718
    @tekken-pakistan2718 4 роки тому +2

    Wow, thanks!