Crackq is an online distributed GPU-accelerated password cracker designed to help penetration testers and network auditors identify weak passwords. It supports a number of hash types and we are actively adding new algorithms. There are no delays associated with manual submissions and payment processing. The results are emailed automatically as soon as the hash is processed.
This is a standard FIFO queue with a maximum size of 10 submissions.
To submit your hashes, download the crackqcli python script. You will need your API key which can be found on the user details page after logging in. The results will be emailed to your registered email address. For more details, refer to the FAQ page.
For example, the following command can
be used to submit the MD5 hash
$ git clone https://github.com/vnik5287/Crackq.git $ ./crackqcli.py -t md5 06aa3b7d55df43e7d7fa4aef94811e4a
$ sudo pip install crackqcli
You can view and purchase your queue submission quota on the user details page after logging in.
The currently supported algorithms along with their time to completion (TTC) are shown below. Note that we are actively adding new dictionary files, GPU nodes, custom rules, etc. This may affect the completion times shown below.
|Password protected PDF files (v1.4 - v1.6)||1||hour|
|WPA / WPA2||2||hours|
|DESCRYPT / DES(Unix)||2||hours|
|MD5CRYPT / FreeBSD MD5 / Cisco IOS MD5 / MD5(Unix)||1.1||hours|
|PHPass MD5 (Wordpress, Joomla, phpBB3)||1||hour|
|MYSQL 4.1+ (double SHA1)||1.2||hours|