03-15-2020, 02:11 AM
03-15-2020, 10:08 AM
Why use of a CPU? Why not Graphic card?
03-15-2020, 10:29 AM
GPU is useless versus Scrypt
03-15-2020, 10:48 AM
Here are my results with disabled GPU:
First with Board-integrated GPU, the second benchmark with the pure CPU:
Borad Integrated GPU-Chip
CPU
First with Board-integrated GPU, the second benchmark with the pure CPU:
Borad Integrated GPU-Chip
Quote:C:\Users\Root\Desktop\hashcat-5.1.0>hashcat64.exe -b --force
hashcat (v5.1.0) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) UHD Graphics 630, 3256/6512 MB allocatable, 24MCU
* Device #2: Intel(R) Core(TM) i7-9700K CPU @ 3.60GHz, skipped.
Benchmark relevant options:
===========================
* --force
* --optimized-kernel-enable
Hashmode: 0 - MD5
Speed.#1.........: 578.5 MH/s (85.53ms) @ Accel:128 Loops:64 Thr:256 Vec:4
Hashmode: 100 - SHA1
Speed.#1.........: 144.3 MH/s (81.22ms) @ Accel:64 Loops:32 Thr:256 Vec:4
Hashmode: 1400 - SHA2-256
Speed.#1.........: 73836.8 kH/s (84.14ms) @ Accel:64 Loops:16 Thr:256 Vec:4
Hashmode: 1700 - SHA2-512
Speed.#1.........: 12976.7 kH/s (59.89ms) @ Accel:16 Loops:8 Thr:256 Vec:1
Hashmode: 2500 - WPA-EAPOL-PBKDF2 (Iterations: 4096)
Speed.#1.........: 7207 H/s (52.05ms) @ Accel:32 Loops:8 Thr:256 Vec:1
Hashmode: 1000 - NTLM
Speed.#1.........: 837.8 MH/s (59.12ms) @ Accel:128 Loops:64 Thr:256 Vec:4
Hashmode: 3000 - LM
Speed.#1.........: 331.7 MH/s (74.92ms) @ Accel:4 Loops:1024 Thr:256 Vec:1
Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS
Speed.#1.........: 376.2 MH/s (65.75ms) @ Accel:128 Loops:32 Thr:256 Vec:4
Hashmode: 5600 - NetNTLMv2
Speed.#1.........: 6130.2 kH/s (63.46ms) @ Accel:16 Loops:4 Thr:256 Vec:4
Hashmode: 1500 - descrypt, DES (Unix), Traditional DES
Speed.#1.........: 15768.7 kH/s (396.60ms) @ Accel:1 Loops:1024 Thr:256 Vec:1
Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000)
Speed.#1.........: 190.2 kH/s (63.10ms) @ Accel:256 Loops:250 Thr:8 Vec:4
Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32)
Speed.#1.........: 626 H/s (74.62ms) @ Accel:4 Loops:2 Thr:8 Vec:1
Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000)
Speed.#1.........: 2355 H/s (65.48ms) @ Accel:128 Loops:32 Thr:8 Vec:1
Hashmode: 7500 - Kerberos 5 AS-REQ Pre-Auth etype 23
Speed.#1.........: 3801.8 kH/s (51.17ms) @ Accel:16 Loops:8 Thr:64 Vec:4
Hashmode: 13100 - Kerberos 5 TGS-REP etype 23
Speed.#1.........: 4516.4 kH/s (86.34ms) @ Accel:32 Loops:8 Thr:64 Vec:4
Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999)
Speed.#1.........: 1216 H/s (52.16ms) @ Accel:32 Loops:8 Thr:256 Vec:1
Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 7999)
Speed.#1.........: 777 H/s (62.69ms) @ Accel:64 Loops:32 Thr:8 Vec:1
Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 35000)
Speed.#1.........: 173 H/s (63.37ms) @ Accel:16 Loops:4 Thr:256 Vec:1
Hashmode: 11600 - 7-Zip (Iterations: 524288)
Speed.#1.........: 214 H/s (55.24ms) @ Accel:64 Loops:16 Thr:256 Vec:1
Hashmode: 12500 - RAR3-hp (Iterations: 262144)
Speed.#1.........: 917 H/s (415.16ms) @ Accel:1 Loops:16384 Thr:256 Vec:1
Hashmode: 13000 - RAR5 (Iterations: 32767)
Speed.#1.........: 792 H/s (59.58ms) @ Accel:32 Loops:8 Thr:256 Vec:1
Hashmode: 6211 - TrueCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit (Iterations: 2000)
Speed.#1.........: 5847 H/s (64.30ms) @ Accel:16 Loops:8 Thr:256 Vec:1
Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 6000)
Speed.#1.........: 2574 H/s (101.09ms) @ Accel:128 Loops:64 Thr:8 Vec:1
Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 500)
Speed.#1.........: 51318 H/s (54.78ms) @ Accel:16 Loops:15 Thr:256 Vec:1
Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 199999)
Speed.#1.........: 65 H/s (60.14ms) @ Accel:16 Loops:8 Thr:256 Vec:1
Started: Sun Mar 15 09:40:01 2020
Stopped: Sun Mar 15 09:45:48 2020
CPU
Quote:C:\Users\Root\Desktop\Passowort-Cracking\0_Programme\hashcat-5.1.0>hashcat64.exe -b -D1
hashcat (v5.1.0) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
* Device #1: Intel's OpenCL runtime (GPU only) is currently broken.
We are waiting for updated OpenCL drivers from Intel.
You can use --force to override, but do not report related errors.
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) UHD Graphics 630, skipped.
* Device #2: Intel(R) Core(TM) i7-9700K CPU @ 3.60GHz, 4070/16281 MB allocatable, 8MCU
Benchmark relevant options:
===========================
* --opencl-device-types=1
* --optimized-kernel-enable
Hashmode: 0 - MD5
Speed.#2.........: 1037.8 MH/s (7.92ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 100 - SHA1
Speed.#2.........: 698.1 MH/s (11.99ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 1400 - SHA2-256
Speed.#2.........: 299.3 MH/s (27.92ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 1700 - SHA2-512
Speed.#2.........: 88896.9 kH/s (94.22ms) @ Accel:1024 Loops:1024 Thr:1 Vec:4
Hashmode: 2500 - WPA-EAPOL-PBKDF2 (Iterations: 4096)
Speed.#2.........: 30676 H/s (66.24ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 1000 - NTLM
Speed.#2.........: 1854.4 MH/s (4.42ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 3000 - LM
Speed.#2.........: 315.6 MH/s (26.35ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 5500 - NetNTLMv1 / NetNTLMv1+ESS
Speed.#2.........: 1118.9 MH/s (7.39ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 5600 - NetNTLMv2
Speed.#2.........: 83706.4 kH/s (50.00ms) @ Accel:1024 Loops:512 Thr:1 Vec:8
Hashmode: 1500 - descrypt, DES (Unix), Traditional DES
Speed.#2.........: 14075.8 kH/s (74.23ms) @ Accel:128 Loops:1024 Thr:1 Vec:8
Hashmode: 500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) (Iterations: 1000)
Speed.#2.........: 90104 H/s (89.52ms) @ Accel:1024 Loops:1000 Thr:1 Vec:8
Hashmode: 3200 - bcrypt $2*$, Blowfish (Unix) (Iterations: 32)
Speed.#2.........: 5957 H/s (83.98ms) @ Accel:32 Loops:8 Thr:8 Vec:8
Hashmode: 1800 - sha512crypt $6$, SHA512 (Unix) (Iterations: 5000)
Speed.#2.........: 6623 H/s (61.55ms) @ Accel:1024 Loops:256 Thr:1 Vec:4
Hashmode: 7500 - Kerberos 5 AS-REQ Pre-Auth etype 23
Speed.#2.........: 6539.1 kH/s (80.11ms) @ Accel:64 Loops:16 Thr:64 Vec:8
Hashmode: 13100 - Kerberos 5 TGS-REP etype 23
Speed.#2.........: 6174.7 kH/s (84.83ms) @ Accel:64 Loops:16 Thr:64 Vec:8
Hashmode: 15300 - DPAPI masterkey file v1 (Iterations: 23999)
Speed.#2.........: 5227 H/s (65.10ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 15900 - DPAPI masterkey file v2 (Iterations: 7999)
Speed.#2.........: 5021 H/s (50.79ms) @ Accel:1024 Loops:256 Thr:1 Vec:4
Hashmode: 7100 - macOS v10.8+ (PBKDF2-SHA512) (Iterations: 35000)
Speed.#2.........: 1153 H/s (51.88ms) @ Accel:1024 Loops:256 Thr:1 Vec:4
Hashmode: 11600 - 7-Zip (Iterations: 524288)
Speed.#2.........: 164 H/s (48.86ms) @ Accel:1024 Loops:512 Thr:1 Vec:8
Hashmode: 12500 - RAR3-hp (Iterations: 262144)
Speed.#2.........: 1164 H/s (54.93ms) @ Accel:128 Loops:16384 Thr:1 Vec:8
Hashmode: 13000 - RAR5 (Iterations: 32767)
Speed.#2.........: 3473 H/s (73.61ms) @ Accel:1024 Loops:1024 Thr:1 Vec:8
Hashmode: 6211 - TrueCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit (Iterations: 2000)
Speed.#2.........: 15088 H/s (56.41ms) @ Accel:1024 Loops:256 Thr:1 Vec:8
Hashmode: 13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES) (Iterations: 6000)
Speed.#2.........: 9988 H/s (68.11ms) @ Accel:1024 Loops:512 Thr:1 Vec:8
Hashmode: 6800 - LastPass + LastPass sniffed (Iterations: 500)
Speed.#2.........: 212.2 kH/s (35.99ms) @ Accel:1024 Loops:500 Thr:1 Vec:8
Hashmode: 11300 - Bitcoin/Litecoin wallet.dat (Iterations: 199999)
Speed.#2.........: 400 H/s (52.38ms) @ Accel:1024 Loops:512 Thr:1 Vec:4
Started: Sun Mar 15 09:56:00 2020
Stopped: Sun Mar 15 09:59:52 2020
03-16-2020, 10:29 PM
Hey, try to test Scrypt on your 9700k pls!
Code:
hashcat.exe --benchmark -m 15700 -D1
03-19-2020, 04:14 PM
actual i´m on holiday, i can check it in 1,5 weeks
my Laptop-CPU is also a Intel, but looks very week :-D
my Laptop-CPU is also a Intel, but looks very week :-D
Quote:OpenCL Platform #2: Intel(R) Corporation
========================================
* Device #2: Intel(R) UHD Graphics, skipped.
* Device #3: Intel(R) Core(TM) i7-10710U CPU @ 1.10GHz, 8151/32605 MB allocatable, 12MCU
Benchmark relevant options:
===========================
* --opencl-device-types=1
* --optimized-kernel-enable
Hashmode: 15700 - Ethereum Wallet, SCRYPT (Iterations: 1)
Speed.#3.........: 12 H/s (675.12ms) @ Accel:1 Loops:1 Thr:1 Vec:1
Started: Thu Mar 19 15:15:37 2020
Stopped: Thu Mar 19 15:15:51 2020
03-21-2020, 12:21 PM
C:\Users\Root\Desktop\hashcat-5.1.0>hashcat64.exe -b -m 15700 -D 1
hashcat (v5.1.0) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
* Device #1: Intel's OpenCL runtime (GPU only) is currently broken.
We are waiting for updated OpenCL drivers from Intel.
You can use --force to override, but do not report related errors.
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) UHD Graphics 630, skipped.
* Device #2: Intel(R) Core(TM) i7-9700K CPU @ 3.60GHz, 4070/16281 MB allocatable, 8MCU
Benchmark relevant options:
===========================
* --opencl-device-types=1
* --optimized-kernel-enable
Hashmode: 15700 - Ethereum Wallet, SCRYPT (Iterations: 1)
Speed.#2.........: 15 H/s (313.84ms) @ Accel:1 Loops:1 Thr:1 Vec:1
Started: Sat Mar 21 11:20:31 2020
Stopped: Sat Mar 21 11:20:39 2020
hashcat (v5.1.0) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
* Device #1: Intel's OpenCL runtime (GPU only) is currently broken.
We are waiting for updated OpenCL drivers from Intel.
You can use --force to override, but do not report related errors.
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) UHD Graphics 630, skipped.
* Device #2: Intel(R) Core(TM) i7-9700K CPU @ 3.60GHz, 4070/16281 MB allocatable, 8MCU
Benchmark relevant options:
===========================
* --opencl-device-types=1
* --optimized-kernel-enable
Hashmode: 15700 - Ethereum Wallet, SCRYPT (Iterations: 1)
Speed.#2.........: 15 H/s (313.84ms) @ Accel:1 Loops:1 Thr:1 Vec:1
Started: Sat Mar 21 11:20:31 2020
Stopped: Sat Mar 21 11:20:39 2020