02-13-2014, 05:47 PM
Hello, I'm new here and have a few questions.
I looked through the wiki and found out how to use hashcat 0.47 and oclHashcat 1.01 very nicely and they are amazing programs.
However, Hashcat appears to be VERY slow at cracking PBKDF2 Salted SHA512 passwords (-m 7100). This is in not only hashcat 0.47 but also oclHashcat. When I try for a (-m 1722) password, it goes much faster, much more than a million per second guesses. But, when I do (-m 7100) password hashes, I get around 5 guesses per second.
All tests done on the same computer (GTX 660, i7 processor, Windows 7). All tests done on the same version of hashcat (varying between ocl and normal for both of them).
Same passwords, just different types of hashes.
Doing a brute force attack and dictionary attack, doesn't matter, still same rates.
Thank you for your help! I'm not sure if PBKDF2 makes it longer time requirement to crack or not?
Thanks for any information or hints about what I am doing wrong!
I looked through the wiki and found out how to use hashcat 0.47 and oclHashcat 1.01 very nicely and they are amazing programs.
However, Hashcat appears to be VERY slow at cracking PBKDF2 Salted SHA512 passwords (-m 7100). This is in not only hashcat 0.47 but also oclHashcat. When I try for a (-m 1722) password, it goes much faster, much more than a million per second guesses. But, when I do (-m 7100) password hashes, I get around 5 guesses per second.
All tests done on the same computer (GTX 660, i7 processor, Windows 7). All tests done on the same version of hashcat (varying between ocl and normal for both of them).
Same passwords, just different types of hashes.
Doing a brute force attack and dictionary attack, doesn't matter, still same rates.
Thank you for your help! I'm not sure if PBKDF2 makes it longer time requirement to crack or not?
Thanks for any information or hints about what I am doing wrong!