Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: cudahashcat error
Post: RE: cudahashcat error
Maybe you should show us your exact command line then. |
|
epixoip |
Old oclHashcat Support
|
3 |
4,951 |
03-31-2016, 03:42 AM |
|
|
Thread: CudaHashcat 1.37 0H/s with Bcrypt
Post: RE: CudaHashcat 1.37 0H/s with Bcrypt
Looks like you've tested 2 candidates in 17 seconds, so your speed is ~ 0.11 H/s.
This is totally expected.
1. bcrypt is very slow, and depending on the cost value (uknown from above output), it... |
|
epixoip |
Old oclHashcat Support
|
3 |
6,189 |
08-24-2015, 08:56 PM |
|
|
Thread: CudaHashcat 1.37 0H/s with Bcrypt
Post: RE: CudaHashcat 1.37 0H/s with Bcrypt
There is a reason we tell people to use bcrypt. And, well, you're looking at that reason. |
|
epixoip |
Old oclHashcat Support
|
3 |
6,189 |
08-24-2015, 09:14 PM |
|
|
Thread: cudaHashcat 0 H/s bcrypt
Post: RE: cudaHashcat 0 H/s bcrypt
0 H/s in this case doesn't mean literally "no hashes per second", it means the kernel is taking too long to run and hasn't reached a checkpoint yet and thus the main thread is not able to calculate th... |
|
epixoip |
Old oclHashcat Support
|
7 |
14,071 |
04-04-2016, 07:37 PM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
As you've identified, most mining rigs run with bare-minimum CPU and RAM, and this is far from ideal for hash cracking rigs. You can sometimes get away with an underpowered CPU, though wordlist manipu... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-23-2015, 10:15 PM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
Atticuss Wrote: (02-23-2015, 10:55 PM)
--
How common is it for CPU cracking to be a better option than GPU? Does it come down to something as simple as hash type?
--
Hash type + attack mode. For ex... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-24-2015, 12:46 AM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
undeath Wrote: (02-24-2015, 12:23 AM)
--
logistix111 Wrote: (02-24-2015, 12:12 AM)
--
You will notice that a very large wordlist, like 2 gigabytes in size for example, will have a higher hashrate th... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-24-2015, 12:48 AM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
Not a very astute observation. Obviously you have to give the GPU enough work to do. If you only feed 120 candidates to an algorithm that can pull somewhere in the KH/s range, then you're obviously st... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-24-2015, 01:24 AM |
|
|
Thread: Creating rules
Post: RE: Creating rules
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
epixoip |
User Contributions
|
3 |
8,817 |
12-23-2014, 06:40 PM |
|
|
Thread: Creating rules
Post: RE: Creating rules
you need both 'c $1' on the same line to both capitalize and append a 1.
Code:
--
epixoip@token:~/hashcat-0.48$ echo -n Zbyszek1 | md5sum
be597e193161d97f91603b0aaa980218 -
epixoip@token:~/ha... |
|
epixoip |
User Contributions
|
3 |
8,817 |
12-23-2014, 08:14 PM |
|
|
Thread: Creating new or custom charset for hashcat
Post: RE: Creating new or custom charset for hashcat
https://hashcat.net/wiki/doku.php?id=mask_attack#custom_charsets |
|
epixoip |
Old hashcat Support
|
3 |
28,490 |
03-18-2016, 10:38 AM |
|
|
Thread: Creating mask file compliant to password policy
Post: RE: Creating mask file compliant to password polic...
|
epixoip |
General Help
|
1 |
3,416 |
03-15-2016, 11:54 PM |
|
|
Thread: Creating a secure hash?
Post: RE: Creating a secure hash?
Your algorithm is nothing more than security through obscurity.
Immediate issues identified:
You're using a "global salt", so it isn't really a salt at all -- it's just a shared secret, which is n... |
|
epixoip |
General Talk
|
6 |
12,465 |
01-21-2014, 08:09 AM |
|
|
Thread: Cracking WPA with hashcat news
Post: RE: Cracking WPA with hashcat news
Your syntax is all sorts of fucked up |
|
epixoip |
User Contributions
|
6 |
11,954 |
04-29-2017, 06:30 PM |
|
|
Thread: Cracking with multiple PCs
Post: RE: Cracking with multiple PCs
vcl wouldn't work though, because hashcat does not supply any nvidia opencl kernels |
|
epixoip |
Very old oclHashcat-plus Support
|
6 |
14,644 |
09-26-2013, 07:46 PM |
|
|
Thread: Cracking simple sentences
Post: RE: Cracking simple sentences
Betawave Wrote: (11-17-2015, 12:39 AM)
--
I DO NOT have a wordlist with phrases
--
You've already identified the best approach. |
|
epixoip |
Old oclHashcat Support
|
6 |
11,234 |
11-17-2015, 02:22 AM |
|
|
Thread: cracking sha256 with a 2 digit salt
Post: RE: cracking sha256 with a 2 digit salt
If you didn't obtain the salts along with the hashes, then you'll need to crack the salts along with the hashes. This is trivial since the salt is only two digits. Basically you'd just use -m 1400 and... |
|
epixoip |
Old hashcat Support
|
5 |
12,594 |
06-07-2015, 02:40 AM |
|
|
Thread: cracking sha256 with a 2 digit salt
Post: RE: cracking sha256 with a 2 digit salt
You'd just build it into your attack organically. Instead of a straight dictionary attack you'd either use -a 0 with prepend rules, -a 1, or -a 6. With -a 3 you'd prepend each mask with ?d?d. |
|
epixoip |
Old hashcat Support
|
5 |
12,594 |
06-07-2015, 06:51 AM |
|
|
Thread: cracking performance doubts
Post: RE: cracking performance doubts
raist2 Wrote: (09-24-2013, 12:24 PM)
--
1) does operating system matter?
--
no.
raist2 Wrote: (09-24-2013, 12:24 PM)
--
2) does ram and CPU matter? maybe for password candidate generation and I... |
|
epixoip |
Very old oclHashcat-plus Support
|
8 |
15,027 |
09-24-2013, 10:13 PM |
|
|
Thread: cracking performance doubts
Post: RE: cracking performance doubts
i get about 60 MH/s, so it's not you. you can stop worrying now. |
|
epixoip |
Very old oclHashcat-plus Support
|
8 |
15,027 |
09-26-2013, 06:18 AM |