Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: My bugs for v0.09b41
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
Fixed:

Quote:- For -m 10 md5($pass.$salt), Bruteforce of length 2 is not working.
- For -m 30 md5(unicode($pass).$salt), Length 2 does not work on bruteforce.
- For -m 110 sha1($pass.$salt), Bruteforce of length 2 is not working.
- For -m 112 Oracle 11g, Bruteforce of length 2 is not working. The rest is perfect.
- For -m 1410 sha256($pass.$salt), bruteforce with length 2 did not work. Everything else works fine.
Fixed:

Quote:Prompt is not shown sometimes
Left:

Quote:- For -m 30 md5(unicode($pass).$salt), Length 15 does not work on all modes
- For -m 111 nsldaps, SSHA-1(Base64), Netscape LDAP SSHA, Dictionary attack works (-a 0) but all the other attack mode fails.
- For -m 141 EPiServer 6.x, Nothing worked.
- For -m 1710 sha512($pass.$salt), dictionary worked for all length and bruteforce for length 8, 12 and 15. All the other test (mode + length) failed.
Fixed:

Quote:- For -m 30 md5(unicode($pass).$salt), Length 15 does not work on all modes

Left:

Quote:- For -m 111 nsldaps, SSHA-1(Base64), Netscape LDAP SSHA, Dictionary attack works (-a 0) but all the other attack mode fails.
- For -m 141 EPiServer 6.x, Nothing worked.
- For -m 1710 sha512($pass.$salt), dictionary worked for all length and bruteforce for length 8, 12 and 15. All the other test (mode + length) failed.
Fixed:

Quote:- For -m 111 nsldaps, SSHA-1(Base64), Netscape LDAP SSHA, Dictionary attack works (-a 0) but all the other attack mode fails.
- For -m 1710 sha512($pass.$salt), dictionary worked for all length and bruteforce for length 8, 12 and 15. All the other test (mode + length) failed.

Left:

Quote:- For -m 141 EPiServer 6.x, Nothing worked.
I have uploaded a new beta b43, please retry everything (not just the stuff that was marked as buggy) because of bugfixes new errors can appear somewhere.
(08-10-2012, 11:37 AM)atom Wrote: [ -> ]Can not reproduce:

Quote:- For -m 130 sha1(unicode($pass).$salt), attack mode 1 and 7 fails. Mode 0,3 and 6 works perfectly well.
- For -m 132 MSSQL(2005), attack mode 1 and 7 fails. Mode 0,3 and 6 works perfectly well.
- For -m 131 MSSQL(2000), something really wrong is happening. Only the password with length 4 was cracked normally with bruteforcing. The password of length 2 that was supposed to be cracked by bruteforcing was cracked by the following
command line in mode 7: cudahashcat-plus64.exe -a 7 -d 1 -m 131 -o found.txt hash.txt ?s?s dic1.txt -- I have double-checked, there is no empty line in dic1.txt so I don't know how it got cracked.
- For -m 1800 sha512crypt, SHA512(Unix), there is random problems. -a 1 for length 15 failed, -a 3 for length 4 failed, -a 6 for length 15 failed, -a 7 for length 4 and 8 failed. The rest worked.
- For -m 2100 DCC2, I have generated the length 15 hashes with PasswordsPro Hash generator and they were cracked in all mode... Dictionary mode for length 2 failed. Bruteforce for length 4 failed. All the rest worked.

I really tried all of them on my hd6990. very strange!
For -m 130, I don't get the same problem on my HD5750 (on v42 only bruteforce of length 2 did not work) so it could be Nvidia specific.
For -m 131, I get pretty much the same thing on both platform. Maybe the hash generation is the culprite. I will try to re-generate them and retest on v44.
For -m 132, I don't get the same problem on my HD5750 (on v42 only bruteforce of length 2 did not work) so it could be Nvidia specific.
For -m 1800, It seems like both platform share the same problems but with all the AMD crashes, it's hard to compare. I will try to regenerate some of the hashes and retest on v44.
For -m 2100, I get the same thing on both platform but the bruteforce on AMD crashed so I don't know the exact outcome. Again, I will try to regenerate the hashes and retest on v44.
For -m 131, I confirm that hash generation was the main source of the problem. There are still bugs however that I will report on the thread of v44.

For -m 2100, I figured out the bug for the length 2 dictionary not being cracked. The hash generated by Atom's perl script was with a username of length 14. Without giving any error message, this hash that was part of a group of 25 hashes total was skipped and not included in the cracking. Generating another hash for the same password with a different user name worked properly.
ok i will close this thread, lets continue on the v44
Pages: 1 2