HASHCAT: GPU PASSWORD CRACKING FOR MAXIMUM WIN
Originally presented at BSides Nashville on 04/11/2015.
An updated version of this talk was presented at Infosec Nashville on 09/29/2014. Think of it as a Director's Cut. All the info is the same, but it was made more projector-friendly and more information to ease newbies into the topic was included. You can find the updated slides here.
The final version of this talk was presented at PhreakNIC on 11/06/2015. The slides are only marginally different from those presented at Infosec Nashville.
From the BSides Nashville CFP:
"After briefly touching on the general concept of password cracking, the focus of the talk will be on the effectiveness of different attack modes in hashcat, with a heavy emphasis on rule-based attacks. While the name of the talk is "hashcat," this talk will almost exclusively discuss the GPU-enabled versions (Specifically cudahashcat). The final phase of the talk will include the results of my own experiments in creating rule sets for password cracking, along with an analysis of the known plaintext passwords from the test hash list."
The original version of this talk has the distinction of most likely being the world's first talk at a hacker con made with 100% Code Page 437 ANSI characters. While Doug Moore of 16c and Soldier of Fortan both did better and more beautiful presentations than mine, their visuals include non-ANSI elements. Originally I wanted to make a plain text file and less through it. Very early in the process, I got the bright idea of adding color to my ANSI characters, but rendering .ans files correctly in a terminal isn't possible on modern Linux distributions. That lead back to making more traditional slides. The entire process was pretty brutal, but totally worth it in the end.
The file pack download can be found here.