05-02-2012, 10:22 AM
Pages: 1 2
05-02-2012, 08:49 PM
Thank you very much atom.
Yes, LM is a good thing
Keep working on these tools =)
Yes, LM is a good thing
Keep working on these tools =)
05-02-2012, 09:37 PM
Blows my pants off.
05-03-2012, 10:31 PM
Awesome work! Thanks for the Oracle 10g!
Status.......: Running
Input.Mode...: Mask (?1?1?1?1?1?1?1?1)
Hash.Target..: AAAAAAAAAAAAAAA:SYS
Hash.Type....: Oracle 7-10g
Time.Running.: 25 secs
Time.Left....: 9 days, 22 hours
Time.Util....: 25710.6ms/0.7ms Real/CPU, 0.0% idle
Speed........: 597.5M c/s Real, 599.3M c/s GPU
Recovered....: 0/1 Digests, 0/1 Salts
Progress.....: 15361638400/513798374428641 (0.00%)
Rejected.....: 0/15361638400 (0.00%)
Status.......: Running
Input.Mode...: Mask (?1?1?1?1?1?1?1?1)
Hash.Target..: AAAAAAAAAAAAAAA:SYS
Hash.Type....: Oracle 7-10g
Time.Running.: 25 secs
Time.Left....: 9 days, 22 hours
Time.Util....: 25710.6ms/0.7ms Real/CPU, 0.0% idle
Speed........: 597.5M c/s Real, 599.3M c/s GPU
Recovered....: 0/1 Digests, 0/1 Salts
Progress.....: 15361638400/513798374428641 (0.00%)
Rejected.....: 0/15361638400 (0.00%)
05-04-2012, 01:17 AM
BTW
1) no increment for bruteforce or hybrid dict+mask attack
2) no skip words (restore) for a dict or dict+rules attack
, right?
Just asking, not whining.
Once again thanks atom
1) no increment for bruteforce or hybrid dict+mask attack
2) no skip words (restore) for a dict or dict+rules attack
, right?
Just asking, not whining.
Once again thanks atom
05-04-2012, 05:51 AM
Thank you very much for the new release; in particular, the new EULA is very generous on your part, given how much time you put into hashcat. I'll be passing the information on the new EULA along to the penetration testing company I work with most often.
FYI: The WPA/WPA2 support is particularly nice to use as pyrit was never as easy to get working, and appears to have been abandoned.
FYI: The WPA/WPA2 support is particularly nice to use as pyrit was never as easy to get working, and appears to have been abandoned.
Pages: 1 2