I have uploaded a new beta b43, please retry everything (not just the stuff that was marked as buggy) because of bugfixes new errors can appear somewhere.
(08-10-2012, 11:37 AM)atom Wrote: [ -> ]Can not reproduce:
Quote:- For -m 130 sha1(unicode($pass).$salt), attack mode 1 and 7 fails. Mode 0,3 and 6 works perfectly well.
- For -m 132 MSSQL(2005), attack mode 1 and 7 fails. Mode 0,3 and 6 works perfectly well.
- For -m 131 MSSQL(2000), something really wrong is happening. Only the password with length 4 was cracked normally with bruteforcing. The password of length 2 that was supposed to be cracked by bruteforcing was cracked by the following
command line in mode 7: cudahashcat-plus64.exe -a 7 -d 1 -m 131 -o found.txt hash.txt ?s?s dic1.txt -- I have double-checked, there is no empty line in dic1.txt so I don't know how it got cracked.
- For -m 1800 sha512crypt, SHA512(Unix), there is random problems. -a 1 for length 15 failed, -a 3 for length 4 failed, -a 6 for length 15 failed, -a 7 for length 4 and 8 failed. The rest worked.
- For -m 2100 DCC2, I have generated the length 15 hashes with PasswordsPro Hash generator and they were cracked in all mode... Dictionary mode for length 2 failed. Bruteforce for length 4 failed. All the rest worked.
I really tried all of them on my hd6990. very strange!
For -m 130, I don't get the same problem on my HD5750 (on v42 only bruteforce of length 2 did not work) so it could be Nvidia specific.
For -m 131, I get pretty much the same thing on both platform. Maybe the hash generation is the culprite. I will try to re-generate them and retest on v44.
For -m 132, I don't get the same problem on my HD5750 (on v42 only bruteforce of length 2 did not work) so it could be Nvidia specific.
For -m 1800, It seems like both platform share the same problems but with all the AMD crashes, it's hard to compare. I will try to regenerate some of the hashes and retest on v44.
For -m 2100, I get the same thing on both platform but the bruteforce on AMD crashed so I don't know the exact outcome. Again, I will try to regenerate the hashes and retest on v44.
For -m 131, I confirm that hash generation was the main source of the problem. There are still bugs however that I will report on the thread of v44.
For -m 2100, I figured out the bug for the length 2 dictionary not being cracked. The hash generated by Atom's perl script was with a username of length 14. Without giving any error message, this hash that was part of a group of 25 hashes total was skipped and not included in the cracking. Generating another hash for the same password with a different user name worked properly.
ok i will close this thread, lets continue on the v44