Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Distributed Computing for cracking a long passwd
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2 3
Ok...

So that will produce a number like x.xxx X 10^30, right?

So how am i going to split the workload?
y u so funny.
(07-09-2012, 09:48 AM)atom Wrote: [ -> ]
(07-09-2012, 04:44 AM)epixoip Wrote: [ -> ]oclhashcat cannot crack passwords > 16 chars.

True, but oclHashcat-lite and hashcat CPU can. The problem is that the first 4 chars can not be static or you will loose all the performance.

In hashcat CPU you can also use this format:

hashConfusedalt

where salt is the fixed string you know and then use an appropriate salted algorithm type (if it exists).

(07-25-2012, 07:56 PM)undeath Wrote: [ -> ]y u so funny.

I don't understand your sarcasm but that's ok...

I'm out... I have downloaded another app to do the distributed workload and it's already running...
Pages: 1 2 3