Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Password Cracking Tool Hashcat Goes Open Source

Hashcat, the popular password recovery utility advertised as the world’s fastest password cracker, has been released as open source.

Hashcat, the popular password recovery utility advertised as the world’s fastest password cracker, has been released as open source.

The announcement was first made on December 4 on Twitter via an MD5 hash that read “hashcat open source” when cracked. Jens ‘atom’ Steube, the main Hashcat developer, later announced in a post on the official forum that the source code for both Hashcat, the CPU-based tool, and oclHashcat, the GPU-based version, has been released under the MIT license.Hashcat source code released

Steube, who is a big fan of open source software, explained that he had been thinking of taking this step for a long time.

One of the reasons for making Hashcat and oclHashcat open source is to allow penetration testers and forensic scientists to add and modify algorithms without exposing any potentially sensitive information. Now that the tools are open source, users will also be able to easily integrate external libraries.

Up until now, oclHashcat supported OpenCL (AMD) and CUDA (Nvidia) graphics processors on Linux and Windows, but OS X was not supported because Apple does not allow “offline” compiling of kernel code. Now that the project is open source, users will be able to compile the GPU kernels and use oclHashcat on OS X.

The fact that the password cracking tools have been released as open source under the MIT license will also enable their integration into popular Linux distributions. Steube says he has planned to generate packages for Kali Linux, which is very popular among pentesters.

Kaspersky Lab, whose experts were assisted by Steube in cracking hashes related to the Gauss malware and the Equation group, published a blog post on Monday explaining the benefits of password cracking tools going open source.

“One of the main [password cracking tool] user-groups are penetration-testers. Their job is to evaluate the security in given areas including evaluation of password security. Also forensic-examiners use these tools in order to gain access to required evidence. These cases and tasks are often highly sensitive and apply to strict rules,” explained Kaspersky’s Marco Preuss. “OpenSource offers the possibility of developing customized extensions without leaking any potential sensitive information to external developers of such tools. This applies if different hash-algorithms are required to be audited while pentesting or specific requirements are set in forensic cases e.g. criminal evidence collection for an upcoming lawsuit.”

Steube has pointed out that the open source release of Hashcat does not mean that he is leaving the project. “No way I’d do that! I’ll stay here, providing the same effort as before,” the developer said.

Advertisement. Scroll to continue reading.

The source code for Hashcat and oclHashcat is available on GitHub. Bug fixes and new features can be submitted, but contributors must ensure that their code complies with a specified set of requirements.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.