Crackq


Crackq is an online distributed GPU-accelerated password cracker designed to help penetration testers and network auditors identify weak passwords. It supports a number of hash types and we are actively adding new algorithms. There are no delays associated with manual submissions and payment processing. The results are emailed automatically as soon as the hash is processed.

Queue utilisation: 1/10

Client version: v0.4

This is a standard FIFO queue with a maximum size of 10 submissions.

To submit your hashes, download the crackqcli python script. You will need your API key which can be found on the user details page after logging in. The results will be emailed to your registered email address. For more details, refer to the FAQ page.

For example, the following command can be used to submit the MD5 hash 06aa3b7d55df43e7d7fa4aef94811e4a:

$ git clone https://github.com/vnik5287/Crackq.git
$ ./crackqcli.py -t md5 06aa3b7d55df43e7d7fa4aef94811e4a

The crackqcli command-line client is also available via pip, easy_install or stand-alone binaries for Windows, Linux and OS X. Refer to Windows, Linux and OS X installation instructions for details.

$ sudo pip install crackqcli

You can view and purchase your queue submission quota on the user details page after logging in.

The currently supported algorithms along with their time to completion (TTC) are shown below. Note that we are actively adding new dictionary files, GPU nodes, custom rules, etc. This may affect the completion times shown below.

Password protected PDF files (v1.4 - v1.6) 1 hour
NTLM 1.2 hours
MD5 2.1 hours
SHA1 2.5 hours
WPA / WPA2 2 hours
DESCRYPT / DES(Unix) 2 hours
MD5CRYPT / FreeBSD MD5 / Cisco IOS MD5 / MD5(Unix) 1.1 hours
PHPass MD5 (Wordpress, Joomla, phpBB3) 1 hour
MYSQL 4.1+ (double SHA1) 1.2 hours

Site Notifications

  1. 29/08/16 14:18: SHA1 hash was submitted by user id = 3219.
  2. 29/08/16 14:24: User id = 3331 signed up.
  3. 29/08/16 16:16: User id = 3332 signed up.
  4. 29/08/16 18:17: User id = 3333 signed up.
  5. 29/08/16 20:06: User id = 3334 signed up.
  6. 29/08/16 22:27: User id = 3335 signed up.
  7. 29/08/16 23:30: User id = 3336 signed up.
  8. 30/08/16 00:36: WPA hash was submitted by user id = 3314.
  9. 30/08/16 04:02: User id = 3337 signed up.
  10. 30/08/16 12:15: User id = 3339 signed up.

Updates

  1. 30/05/2016: Added HOTBOX-xxxx to the list of default ESSIDs. See the full list here.
  2. 28/05/2016: We're now accepting Ether as the payment option (ethereum.org)!
  3. 05/05/2016: Added 4G-Gateway-XXXX to the list of default ESSIDs. See the full list here.
  4. 27/02/2016: Added RogersXXXXX to the list of default ESSIDs. See the full list here.
  5. 26/02/2016: Stand-alone Windows client binary v0.4 can be downloaded from here.
  6. 26/02/2016: Crackq client v0.4 is released. Added support for MYSQL 4.1+ (double SHA1) hashes.
  7. 20/10/2015: Added Speedy-XXXXXX and Fibertel WiFixxx to our default WPA list.
  8. 16/09/2015: Added support for password protected PDF files. Currently versions 1.4 - 1.6 are supported.
  9. 01/09/2015: Added EE-BrightBox-xxxxxx and TPG-XXXX to the list of default ESSIDs. See the full list here.
  10. 26/05/2015: Added support for PHPass (Wordpress, Joomla and phpBB3) hashes.
  11. 13/04/2015: WPA/WPA2 rules and brute-force attacks supported by Crackq hashcrack.org/crackq/page?n=wpa.