Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: 6970 users wanted
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
(08-17-2012, 08:17 PM)proinside Wrote: [ -> ]mastercracker, you mean simple dictionary with no rules at all ?

I don't want to "waste" time cleaning the actual driver to install
a new version that do not brings nothing new about this specific
problem. Tks.
Yes, simple dictionary attack works. I did not test with rules so I don't know. For sure, combination, bruteforce and both hybrid attack fails. Those are the -a 1, -a 3, -a 6 and -a 7.
@mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711).
(08-17-2012, 11:42 PM)atom Wrote: [ -> ]@mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711).
You are right Atom. -m 2611 works completely. -m 2711 and -m 2811 works only with dictionary mode.
1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist.

sha512($pass.$salt)
0/663

I also tested to crack a single hash but it failed.
(08-18-2012, 10:36 AM)K9 Wrote: [ -> ]1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist.

sha512($pass.$salt)
0/663

I also tested to crack a single hash but it failed.
Yes, it depends on which oclhashcat-plus version you use. In the latest beta, it's almost completely fixed. At least for my HD5750 using catalyst 12.8.
It is working with small salts but there is a problem with longer salts I think. I sent you a file via pm.
Pages: 1 2