Introduction
Versions
The test case uses Hashcat latest version:
Release year | Version |
2021 | 6.2.4 |
2022 | 6.2.6 |
If you are interested in another version, please send us an email at qlab@qarnot.com.
Prerequisites
- Please ensure that you have created a Qarnot account here and retrieve your Qarnot authentication token on the same page
- Install Qarnot’s Python SDK here
Note: in addition to the Python SDK, Qarnot provides C# and Node.js SDKs and a Command Line Interface.
Test case
eb61eead90e3b899c6bcbe27ac581660
958152288f2d2303ae045cffc43a02cd
2c9341ca4cf3d87b9e4eb905d6a3ec45
75b71aa6842e450f12aca00fdf54c51d
031cbcccd3ba6bd4d1556330995b8d08
b5af0b804ff7238bce48adef1e0c213f
dc647eb65e6711e155375218212b3964
Launching the case
Once everything is set up, use the following script to launch the password cracking computation on Qarnot.
hashcat.py
Make sure you have copied your authentication token in the script (instead of <<<MY_SECRET_TOKEN>>>
) to be able to launch the task on Qarnot.
Make sure that the input files are in the same folder named dataset-hashcat/
. Your working directory should look like this:
dataset-hashcat/
:target_hashes.txt
: list of hashed passwords to crackwordslist.txt
: list of passwords to test
hashcat.py
: Python script to run the computation on Qarnot
To launch this script, you just need to open a terminal in your working directory and execute python3 hashcat.py &
.
Results
At any given time, you can monitor the status of your task on the Console.
hashcat-results/cracked.txt
with the following content, unveiling the hashes and the password hidden behind: eb61eead90e3b899c6bcbe27ac581660:HELLO
dc647eb65e6711e155375218212b3964:Password
031cbcccd3ba6bd4d1556330995b8d08:GuessMe
Wrapping up
That’s it! If you have any questions, please contact qlab@qarnot.com and we will help you with pleasure!