Extreme GPU Bruteforcer 2.0.1 Full | 25 Mb

Extreme GPU Bruteforcer - Professional program for recovering passwords from hashes using GPU (GPU). The program supports the following types of hashes: MySQL, MySQL5, DES (Unix), MD4, MD5, MD5 (Unix), MD5 (APR), MD5 (phpBB3), MD5 (Wordpress), NTLM, SHA-1 and many others. On modern graphics cards that support CUDA technology firm NVIDIA, the program shows great speed - for example, the average speed of password forcing procedure on a video card with an NVIDIA GTS250 is 420 million passwords per second for MD5-hash, 700 million passwords per second for MySQL-hashes and 550 million passwords per second for NTLM-hashes.

The program supports several unique types of attacks, including attacks on the mask and dictionary attack, which allow you to quickly recover complex passwords! The program also supports the simultaneous operation of multiple graphics cards (up to 32 GPU), which allows for incredible speeds of billions of passwords per second! The maximum number of unsalted hashes, both can work with the program - 25000000, salted hashes - 5000000.

Type hashes average speed (in the attack on a hash on the NVIDIA GTS250)
MD5 420 000 000 n / a
MySQL 1.08 billion n / a
MD4 605 000 000 n / a
NTLM 557 000 000 n / a
SHA-1 120 000 000 n / a
MySQL5 66 million p / s
LM 49 million p / s
Domain Cached Credentials 255 000 000 n / a
md5 (md5 ($ pass)) 165 000 000 n / a
md5 ($ pass. $ salt) 180 000 000 n / a
md5 ($ salt. $ pass) 260 000 000 n / a
md5 (md5 ($ pass). $ salt) 157 000 000 n / a
md5 (md5 ($ salt). $ pass) 267 000 000 n / a
md5 ($ salt. $ pass. $ salt) 240 000 000 n / a
md5 ($ salt.md5 ($ pass)) 90,000,000 n / a
md5 (md5 ($ salt). md5 ($ pass)) 106 000 000 n / a
md5 (md5 ($ pass). md5 ($ salt)) 106 000 000 n / a
md5 ($ username. '\ 0'. $ pass) 260 000 000 n / a
sha1 ($ username. $ pass) 86,000,000 n / a
sha1 (strtolower ($ username). $ pass) 86,000,000 n / a
DES (Unix) 1,7 million p / s
MD5 (Unix) 0,16 million p / s
MD5_Half 381 million p / s
MD5_Middle 375 000 000 n / a
MD5_Unicode 400 000 000 n / a
RAdmin v2.x 203 million p / s

For the program it needs to pass the following command line:
A. The name of INI-file with the settings of attack. This parameter is optional, because by default each EXE-module uses the INI-file whose name matches the name of the module (for example, the module "MD5.exe" by default, uses the configuration file "MD5.ini"), but you can create a few INI-files with different parameters of the attack and in turn transfer them to the program.

Two. The name of a text file with hashes. The format string to hash a "one line = one hash". In the distribution of the program includes test files with examples of hashes. This parameter is optional.

Changes in version 2.0.1:
- The module md5 ($ pass. $ Salt). Exe maximum length of the salt is increased to 104 characters.
- Added new modules sha256 ($ pass. $ Salt). Exe, sha256 ($ salt. $ Pass). Exe, sha512 ($ pass. $ Salt). Exe and sha512 ($ salt. $ Pass). Exe.
- Fixed memory leak in the hybrid attack.
- Fixed a bug where the mask is not set minimum and maximum password length.
- Fixed bug with redirecting the text output from the console to a text file.
 
No Password
Download Here :
0 Komentar untuk "Extreme GPU Bruteforcer 2.0.1 Full | 25 Mb"

Back To Top