oclHashcat-plus 0.071 crashes when using brute-force option - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: oclHashcat-plus 0.071 crashes when using brute-force option (/thread-1124.html) |
oclHashcat-plus 0.071 crashes when using brute-force option - LarryX - 04-27-2012 Version: oclHashcat-plus 0.071 OS: Windows 7 64-bit GPU: NVidia GTX 580 I am using the following command: cudaHashcat-plus64.exe -m 500 mypasswd -a 3 -1 ?l?u?d?s?F ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1 This runs fine, but as soon as I press the "s" key to see the status it crashes just after outputting the running time, for example: Code: s The details of the crash are as follows: Code: Problem signature: FYI, the dictionary attack mode does not crash when I check the status. One follow-up question. How do you specify the password length when using the brute-force attack mode ? No matter what mask I put, it always outputs the following line: Code: Password lengths range: 1 - 15 One more thing. "cudaHashcat-plus64.exe -V" still shows 0.07 instead of 0.071. RE: oclHashcat-plus 0.071 crashes when using brute-force option - K9 - 04-27-2012 I had the same problem when I used too many charsets :p RE: oclHashcat-plus 0.071 crashes when using brute-force option - LarryX - 04-27-2012 Thanks for confirming. Just did some further testing and with a charset of ?l?u?d?s?F it crashes as soon as I specify a mask of 8 or more characters. While testing I noticed that the "Password lengths range: 1 - 15" only seems to be a cosmetic bug, assuming it should reflect the amount of characters in the mask. For what it's worth, it also crashes with a charset of ?1 and a mask of 12 or more characters. RE: oclHashcat-plus 0.071 crashes when using brute-force option - atom - 04-27-2012 (04-27-2012, 12:32 PM)LarryX Wrote: . While testing I noticed that the "Password lengths range: 1 - 15" only seems to be a cosmetic bug, assuming it should reflect the amount of characters in the mask. Yes and no. For example a mask length 16 can not display Password lengths range: 1 - 16 since oclHashcat-plus supports cracking only up to lenght 15. RE: oclHashcat-plus 0.071 crashes when using brute-force option - LarryX - 04-27-2012 (04-27-2012, 12:58 PM)atom Wrote: Yes and no. For example a mask length 16 can not display Password lengths range: 1 - 16 since oclHashcat-plus supports cracking only up to lenght 15. Yes I noticed that. I initially had a mask of 16. The process starts just fine, but then I noticed that my GPU usage was around 0%. I think in a future version there should be an error message when someone tries to use a length of more than 15. I'm obviously also hoping that the crash will be fixed at some point RE: oclHashcat-plus 0.071 crashes when using brute-force option - atom - 04-27-2012 You are absolutly right. I have already fixed it: Quote:root@ht:~/oclHashcat-plus-0.08# ./cudaHashcat-plus64.bin -m 500 example500.hash -a 3 -1 ?l?u?d?s?F ?1?1?1?1?1?1?1?1?1?1?1 --quiet Thanks for reporting! RE: oclHashcat-plus 0.071 crashes when using brute-force option - LarryX - 04-27-2012 Thanks! |