This is a brute force password cracker for databases (currently Oracle 11g amd Microsoft SQL Server). I intended to create a password cracker which uses CUDA framework for NVIDIA GPUs to speed up computations. It implements session handling to pause and continue cracking, it processes multiple passwords simultaneously. The source code is written in a way to support arbitrary character sets and is published under GPLv3.

Download executable:
cudadbcracker_binaries.zip

Download source code:
cudadbcracker_source.zip


Usage information:

Contacts ======== Author: Marcell Major Author's e-mail (gmail.com): marcell.major Overview ======================= cudadbcracker is a salted SHA-1 cracker for cracking database password hashes using CUDA enabled videocards. cudadbcracker was developed using NVIDIA CUDA Software Development Kit (CUDA SDK) Version 2.1. cudadbcracker is free software under GNU GENERAL PUBLIC LICENSE Version 3, see license.txt. cudadbcracker currently supports MSSQL and Oracle 11g hashes. Features: -cracking multiple password hashes (max. 999) -session handling (cracking can be interrupted and continued later) -logging cracked password -optional character set selection Quick start =========== Show command line options: cudadbcracker.exe Show available GPUs: cudadbcracker.exe -v Crack MSSQL hashes: cudadbcracker.exe -h mssql -c un -i mssqltest.hashes Cracking Oracle 11g hashes: cudadbcracker.exe -h ora11g -c uln -k 2 -n 2 -i ora11gtest.hashes Continuing a saved session: cudadbcracker.exe -l default.ses Running tests: Start mssql_test.cmd or ora11g_test.cmd. Files: ====== cudadbcracker.exe - main executable cudart.dll - CUDA runtime (part of CUDA toolkit) cutil32.dll - CUDA utils (part of CUDA SDK) libeay32.dll - OpenSSL support license.txt - GNU GENERAL PUBLIC LICENSE Version 3 mssql_test.cmd - test command for MSSQL tests mssql_testcase.txt - test hashes for MSSQL tests mssql_testcase_pass.txt - test passwords for MSSQL tests ora11g_test.cmd - test command for Oracle 11g tests orasha_testcase.txt - test hashes for Oracle 11g tests orasha_testcase_pass.txt - test passwords for Oracle 11g tests Command line options ==================== cudadbcracker.exe -h <hashtype> -i <inputfile> -s <sessionfile> -l <loadsession> -r <record> -c <charset> -n <numstreams> -k <kernels> -v -d <device> * -h, --hashtype=<hashtype> Type of hashes to load (mssql,ora11g). * -i, --inputfile=<inputfile> Name of input file. -s, --sessionfile=<sessionfile> Name of session file. Default is "default.ses". -l, --loadsession=<loadsession> Name of session file to load. -r, --record=<record> Name of record file. Default is "default.rec". -c, --charset=<charset> Character set used for cracking (can be any combination of 'u'pper, 'l'ower,'n'umeric and 's'pecial). Default is "un". -n, --numstreams=<numstreams> Number of streams. Default value:1 -k, --kernels=<kernels> Number of kernels per streams. Default value:1 -v, --view View GPU information about CUDA enabled devices. -d, --device=<device> Selected CUDA device index. If not given, the default is auto select. * = required parameter When loading from session file, all other parameters can be skipped.

Link: http://marcellmajor.com/frame_cudadbcracker.html

PS: Need porting for Linux.

@firebitsbr