08-04-2012, 06:39 AM
BUgs for v0.09b41 with 301.42 on GTX470 GPU under Windows 7 64 bit.
Briefly, I have designed a series of test that covers most hash types and attack-modes with 5 different password lengths (2,4,8,12 and 15). Here's the result I have. Other Beta tester, please test the faulty conditions that I find so that we can know if it is system, GPU or myself specific:
- Status bar at the bottom not always appearing (really intermittent).
- For -m 2100 DCC2, length 4 password not cracked in attack mode 3 (bruteforce). The attack starts normally but ends in a cuStreamSynchronize<> 999 error. Interesting enough, length 8 finishes with the same error message but the password is written in the output file.
- For -m 2811 IPB, only attack mode 0 works, the others fails to crack passwords.
- For -m 11 Joomla, only attack mode 0 works, the others fails to crack passwords.
- What are the changes for LM hashes, they don't work at all anymore?
- For -m 900 MD4, length 12 does not work in attack mode 3 (bruteforce).
- I think that at one point we could mix and crack both phpbb3 and wordpress together. It does not work anymore, it cracks only the hash type that comes first in the hash list.
- For -m 2811 MyBB, it gives a length exception error. The salt tested was 12345678 which should be valid.
- For -m 2711 VB > 3.8.5, only attack mode 0 works, the others fail to crack passwords.
Tested and works perfectly (-m): 1100, 1600, 2600, 400 (when only 1 algo present), 500, 0, 300, 1000, 21, 101, 100, 1400, 1700, 121, 2611.
I include the .bat, dic, hash and passwords used. The .bat file contains only the base structure for 1 hash type, you have to adapt it to your system parameters and rename the file used.
Briefly, I have designed a series of test that covers most hash types and attack-modes with 5 different password lengths (2,4,8,12 and 15). Here's the result I have. Other Beta tester, please test the faulty conditions that I find so that we can know if it is system, GPU or myself specific:
- Status bar at the bottom not always appearing (really intermittent).
- For -m 2100 DCC2, length 4 password not cracked in attack mode 3 (bruteforce). The attack starts normally but ends in a cuStreamSynchronize<> 999 error. Interesting enough, length 8 finishes with the same error message but the password is written in the output file.
- For -m 2811 IPB, only attack mode 0 works, the others fails to crack passwords.
- For -m 11 Joomla, only attack mode 0 works, the others fails to crack passwords.
- What are the changes for LM hashes, they don't work at all anymore?
- For -m 900 MD4, length 12 does not work in attack mode 3 (bruteforce).
- I think that at one point we could mix and crack both phpbb3 and wordpress together. It does not work anymore, it cracks only the hash type that comes first in the hash list.
- For -m 2811 MyBB, it gives a length exception error. The salt tested was 12345678 which should be valid.
- For -m 2711 VB > 3.8.5, only attack mode 0 works, the others fail to crack passwords.
Tested and works perfectly (-m): 1100, 1600, 2600, 400 (when only 1 algo present), 500, 0, 300, 1000, 21, 101, 100, 1400, 1700, 121, 2611.
I include the .bat, dic, hash and passwords used. The .bat file contains only the base structure for 1 hash type, you have to adapt it to your system parameters and rename the file used.