What's new in Extreme GPU Bruteforcer 2.2

May 29, 2012
  • The program now comes as a single EXE file, and the required algorithm is specified by the first startup parameter
  • All operation results are now written to the output file EGB.out, and all found passwords – to the dictionary file EGB.dic.
  • Program code has been essentially optimized; now the size of the only executable module is just 2.4MB (32-bit) and 3.6MB (64-bit)!
  • In the 64-bit version, the 67108864 (0x4000000) hashes restriction has been removed.
  • Removed algorithm DES(Unix)-2; the program now checks whether the salts are equal automatically.
  • The program now includes code for architectures: sm_11 and sm_20.
  • Added new parameter "CreateBackupFile", which allows to disable creating backup copy for the source file with hashes (with DeleteHashes=1).
  • Updated program description.

New in Extreme GPU Bruteforcer 1.7 (Oct 11, 2010)

  • This version has undergone big changes; the format of INI files has changed significantly. The program's general settings are now stored in section [Settings], and an attack's individual settings are stored in its own section
  • "MinLength", "MaxLength", "CharacterSet" and "Mask" parameters in INI files are no longer supported.
  • Speeded up handling large hash lists (over a million items) by 25...30%.
  • Maximum number of salted hashes that can be loaded to the program increased to 800.
  • Several dictionaries of frequently used passwords added to the distributive of the program, and these same dictionaries are included in the default settings for all the modules.
  • Password length in modules MD5.exe and MD5_Unicode.exe limited to 15 characters.

New in Extreme GPU Bruteforcer 1.6.2 (Oct 11, 2010)

  • Application recompiled to run with CUDA v3.0.
  • Maximum number of GPU increased to 32.
  • Added new modules: MD5_Middle.exe and RAdmin v2.x.exe.
  • Before launching an attack, the program now shows the maximum password, salt and user name length (if they were used during hashing).
  • The OUT file now includes attack end time.
  • Fixed the error in the mask attack where the MinLength property has a value lesser than the mask length.
  • Added new parameter to INI files: HexSalt – determines salt (or user name) format:
  • "0" (default) – plain text format;
  • "1" – hexadecimal format.
  • This allows to take advantage of EGB for recovering passwords to hashes of many other types: sha1($hex_salt.$pass), md5($hex_salt.$pass), etc.

New in Extreme GPU Bruteforcer 1.5.1.0 (Aug 25, 2009)

  • In the new version:
  • Added auto-saving current password in INI file during attack every 5 minutes.
  • All application modules recompiled to the latest edition of CUDA - v2.2.
  • Added new module - md5($username.0.$pass). Search speed per hash on GF8800GS is 155M p/s.
  • Increased maximum password length in the modules MD5.exe (to 55 characters) and MD5_Unicode.exe (to 27 characters).
  • Note: If someone needs the support for long passwords in other hashing modules (besides salted ones, where increasing the password length is not planned), leave the respective request on the forum or drop a note via PM/E-mail.

New in Extreme GPU Bruteforcer 1.5.0.0 (Jun 1, 2009)

  • Added mask attack. To enable it, in the INI file create (or uncomment) the "Mask" parameter that contains a mask; for example: pass?d?d?d?d?d?d, ?u?u?u?l?l?l2009, etc. The application supports up to 15 custom character sets (in the INI file parameters "CustomCharacterSet1"..."CustomCharacterSetF"), where you can define custom character sets or combinations of standard character sets - for example, "CustomCharacterSet1=?l?u?d", "CustomCharacterSet9=abcdefABCDEF?d", which are engaged in the "Mask" parameter as ?1 and ?9 respectively (Note: Mask in EGB is formed practically the same way as in PasswordsPro). The speed of mask attack for all modules is the same as the speed of brute force attack!
  • Added new module, "MD5_Unicode.exe", for recovering Unicode passwords to MD5 hashes. Its average operation speed on GF8800GS is 240М p/s.
  • Added new parameter to INI file - AttackTime, which allows limiting attack time (in minutes) and thus improves the flexibility of the application when it is launched from a BAT-file with different INI files (for example, with different character sets for the attack).
  • Up to 512 - increased the maximum value of the StreamProcessors parameter.

New in Extreme GPU Bruteforcer 1.4.0.0 (Nov 21, 2008)

  • Speeded up operation of many hash modules. Below are the old and the new operating speeds of the module when attacking one hash on GF8800GS video card:
  • md5(md5($pass)), was 98M p/s, now 110M p/s
  • md5($pass.$salt), was 140M p/s, now 165M p/s
  • md5($salt.$pass), was 100M p/s, now 155M p/s
  • md5(md5($pass).$salt), was 86M p/s, now 100M p/s
  • md5(md5($salt).$pass), was 75M p/s, now 155M p/s
  • md5($salt.$pass.$salt), was 70M p/s, now 115M p/s
  • md5(md5($salt).md5($pass)), was 65M p/s, now 75M p/s
  • md5(md5($pass).md5($salt)), was 65M p/s, now 75M p/s
  • Added new module for processing Domain Cached Credentials hashes. Search speed per hash on GF8800GS is 160M p/s.
  • Added new module for processing hashes from SMF - sha1($username.$pass). Search speed per hash on GF8800GS is 40M p/s.
  • Note: For the sake of compatibility with the format of existing modules, the new modules use the following format of source hashes for attack: Hash:Username; i.e. user name is to be specified behind hash and not before it (as in PasswordsPro).
  • Expanded FAQ section in the description of the software.