hashcat 4.2.1-1 source package in Ubuntu


hashcat (4.2.1-1) unstable; urgency=medium

  * Team upload.
  * New upstream version 4.2.1
  * Update debian/copyright
  * Bump Standards-Version (no change)

 -- Sophie Brun <email address hidden>  Wed, 22 Aug 2018 15:55:19 +0200

Upload details

Uploaded by:
Debian Security Tools on 2018-08-22
Uploaded to:
Original maintainer:
Debian Security Tools
kfreebsd-any amd64 i386 all
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Cosmic release on 2018-08-23 universe misc


Cosmic: [FULLYBUILT] amd64 [FULLYBUILT] i386


File Size SHA-256 Checksum
hashcat_4.2.1-1.dsc 1.7 KiB bc3a32db6d524e4f0e7b8f99b26ebb47a191768b0d8574dce998706ac35c9bc8
hashcat_4.2.1.orig.tar.gz 3.8 MiB 7dad73c3406e66756b19e15ae8bcc482a52a422e8fb905feb6db4d2eb32e5320
hashcat_4.2.1-1.debian.tar.xz 10.3 KiB 5cb3faf8cec3e06e7871a06a2e45c54695446d002e69742e1a48a30ce377143d

Available diffs

No changes file available.

Binary packages built by this source

hashcat: World's fastest and most advanced password recovery utility

 Hashcat supports five unique modes of attack for over 200 highly-optimized
 hashing algorithms. hashcat currently supports CPUs, GPUs, and other
 hardware accelerators on Linux, and has facilities to help enable
 distributed password cracking.
 Examples of hashcat supported hashing algorithms are:
 MD5, HMAC-MD5, SHA1, HMAC-SHA1, MySQL323, MySQL4.1/MySQL5, phpass,
 MD5(Wordpress), MD5(phpBB3), MD5(Joomla), md5crypt, MD5(Unix),
 FreeBSD MD5, Cisco-IOS, MD4, NTLM, Domain Cached Credentials (DCC),
 MS Cache, SHA256, HMAC-SHA256, md5apr1, MD5(APR), Apache MD5, SHA512,
 HMAC-SHA512, Cisco-PIX, Cisco-ASA, WPA/WPA2, Double MD5, bcrypt,
 Blowfish(OpenBSD), MD5(Sun), Double SHA1, SHA-3(Keccak),Half MD5,
 Password Safe SHA-256, IKE-PSK MD5, IKE-PSK SHA1,
 Android PIN, AIX {smd5}, AIX {ssha256}, AIX {ssha512}, AIX {ssha1},
 GOST, GOST R 34, Fortigate (FortiOS), OS X v10.8+, GRUB 2, IPMI2, RAKP,
 HMAC-SHA1, sha256crypt, SHA256(Unix), Drupal7, WBB3, scrypt, Cisco $8$,
 Cisco $9$, Radmin2, Django (PBKDF2-SHA256), Cram MD5, SAP, iSSHA-1,
 PrestaShop, PostgreSQL, Challenge-Response Authentication (MD5),
 MySQL Challenge-Response, Authentication (SHA1),
 SIP digest authentication (MD5), Plaintext, Joomla < 2.5.18, PostgreSQL,
 osCommerce, xt:Commerce, Skype, nsldap, Netscape, LDAP, nsldaps,
 SSHA-1(Base64), Oracle S: Type (Oracle 11+), SMF > v1.1, OS X v10.4,
 v10.5, v10.6, EPi, Django (SHA-1), MSSQL(2000), MSSQL(2005),
 PeopleSoft, EPiServer 6.x < v4, hMailServer, SSHA-512(Base64),
 LDAP {SSHA512}, OS X v10.7, MSSQL(2012 & 2014), vBulletin < v3.8.5,
 PHPS, vBulletin > v3.8.5, IPB2+, MyBB1.2+, Mediawiki B type,
 WebEdition CMS, Redmine.
 Hashcat offers multiple attack modes for obtaining effective and
 complex coverage over a hash's keyspace. These modes are:
  * Brute-Force attack
  * Combinator attack
  * Dictionary attack
  * Fingerprint attack
  * Hybrid attack
  * Mask attack
  * Permutation attack
  * Rule-based attack
  * Table-Lookup attack
  * Toggle-Case attack
  * PRINCE attack

hashcat-data: Data files for hashcat advanced password recovery utility

 Hashcat is an advanced CPU/GPU-based password recovery utility supporting
 seven unique modes of attack for over 100 optimized hashing algorithms.
 This package contains the data files for hashcat, including charsets,
 rules, salts, and tables.

hashcat-dbgsym: debug symbols for hashcat