Hashrunner 2015 Write-up
We have posted up our team write-up for hashrunner2015 Our resources used in the contest will be released shortly Congrats Team Hashcat, you guys really owned it!!
View ArticleHashrunner 2015 Resource Package
We have attached some binaries and src of most of the resources used by our team for Hashrunner 2015 Package includes -src and binaries for challenges 7, 8 & 9 -Binaries for the crackers/generators...
View ArticleCrack Me If You Can 2015
Our team participated in Korelogic's Crack Me If You Can 2015 and placed 2nd. Link to write-up
View ArticleHow we cracked millions of Ashley Madison bcrypt hashes efficiently
Not long after the release of the Ashley Madison leaks, many groups and individuals attempted to crack the bcrypt hashes. Since the developers used a cost factor of 12 for the bcrypt hash, this made...
View ArticleCsP: Our take on the cracked AM passwords thus far
We would like to present some statistics based on our current finds of roughly 11.7 million passwords. Firstly, we would like to state that we are predominantly targeting a 15 million subset of the 36...
View ArticleMyspace hashes, length 10 and beyond
RecoveredPercentTotal360,213,049Usable data359,005,905355,886,68699.13%Unique116,822,086113,830,17697%Salted hashes68,494,253Salted pairs66,099,05947,120,45371.29%non-user...
View ArticleBitcrack / Hashkiller contest write-up 2016
Bitcrack / Hashkiller 2016 contest write-up Members Amd gearjunkie mastercracker usasoft blazer hops Milzo User cvsi Jimbas s3in!c Waffle espira jugganuts420 tony winxp5421SoftwareHashcatV3 &...
View Article32hex is not MD5? What are Youku talking about?
 32hex is not MD5? What are Youku talking about? During April 2017, various online sources alleged that Youku, a Chinese video hosting service was hacked and that roughly 100 million user accounts were...
View Article320 Million Hashes Exposed
Earlier this month (August 2017) Troy Hunt founder of the website Have I been pwned? [0] released over 319 million plaintext passwords [1] compiled from various non-hashed data breaches, in the form of...
View ArticleCrack me if you can 2018 write-up
Crack me if you can write-up 2018 Active participating members15GPUs equivalent to GTX1080 peak 60GPUs equivalent to GTX1080 constant 40CPU threads peak1300CPU threads constant600Contest related...
View ArticleCracktheCon Year 1
Over the years the members of the group have participated in quite a few password contests. Positive hack days’s Hashrunner, Defcon | Derbycon’s Crack Me If You Can, and SaintCon’s Pcrack. In fact,...
View ArticleDefcon CMIYC 2019 Write-up
Rough hardware estimateHardwareCountHardwareCount2080 TI21070251080 TI221060610801597021070 TI:7CPU Physical Core:892Software usedJohn the ripper + MPIPasscovery SuiteHashcatBcvalHashtopolis This year...
View ArticleKorelogic's CMIYC 2021 @ DEF CON 29 Write-up
Crack me if you can write-up 2021 We once again assembled the team to take on KoreLogic’s annual Crack me if you can contest for Def Con 29. This year we had 12 members participating they were s3in!c,...
View ArticleKorelogic's CMIYC 2022 @ DEF CON 30 Write-up
What a breath of fresh air to have DEF CON 30 not be canceled this year. We are thankful that Korelogic’s CMIYC is running strong 13 years in. Going into this contest we assumed the competition would...
View ArticleKorelogic's CMIYC 2023 @ DEF CON 31 Write-up
 Members that participated (10 crackers/ 1 support)s3in!cgolem445hopsblazergearjunkiewinxp5421AMDcvsipdoWaffleUsasoft (support)Peak computing power (25-30 standardized to 4090)Before the contestThe...
View ArticleKorelogic's CMIYC 2024 @ DEF CON 32 Write-up
Members:AMD, blazer, gearjunkie, golem445, hops, meowmeowbean, s3inlc, waffle, winxp5421Â usasoft (infra)IntroductionA huge thanks to KoreLogic for once again hosting the annual premier password...
View Article