Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Share your vclHashcat-lite speeds
Post: RE: Share your vclHashcat-lite speeds
yes, i was there briefly to socialize |
|
epixoip |
General Talk
|
29 |
55,584 |
12-05-2012, 05:28 AM |
|
|
Thread: Share your vclHashcat-lite speeds
Post: RE: Share your vclHashcat-lite speeds
no, supercl just shifts where you need the high bandwidth/low latency link from between your broker and compute nodes, to between your compute nodes and your storage.
why do you want to eliminate inf... |
|
epixoip |
General Talk
|
29 |
55,584 |
12-15-2012, 02:29 AM |
|
|
Thread: Share your vclHashcat-lite speeds
Post: RE: Share your vclHashcat-lite speeds
nicely done! welcome to the club :D |
|
epixoip |
General Talk
|
29 |
55,584 |
01-10-2013, 08:46 PM |
|
|
Thread: Share your vclHashcat-lite speeds
Post: RE: Share your vclHashcat-lite speeds
sort of.
supercl reduces the amount of kernel executions that occur over the network. instead of making one call for each kernel execution, it allows you to make just one call for *all* your kernel... |
|
epixoip |
General Talk
|
29 |
55,584 |
01-11-2013, 03:12 AM |
|
|
Thread: Share your vclHashcat-lite speeds
Post: RE: Share your vclHashcat-lite speeds
Man, I have no idea what you guys are on about. The entire 5000-series in general is very power efficient and quite easy to cool, and the 5970s draw less watts than a 7970. I run all four of my 5970s ... |
|
epixoip |
General Talk
|
29 |
55,584 |
01-11-2013, 06:00 PM |
|
|
Thread: sha512crypt issue
Post: RE: sha512crypt issue
Phenom x4 is your CPU. mastercracker asked about your GPU. |
|
epixoip |
Old oclHashcat Support
|
9 |
13,806 |
03-03-2014, 03:39 AM |
|
|
Thread: sha512crypt hash error
Post: RE: sha512crypt hash error
|
epixoip |
Very old oclHashcat-plus Support
|
10 |
24,508 |
10-01-2012, 09:37 PM |
|
|
Thread: sha512($salt.md5($password))
Post: RE: sha512($salt.md5($password))
Wow, that's much improved over the old dynamic formats. Which only serves to remind me that I really need to find some spare time to work on my dynamic cracker. |
|
epixoip |
General Help
|
3 |
5,966 |
07-19-2015, 10:57 AM |
|
|
Thread: SHA512 without salt
Post: RE: SHA512 without salt
Ok I did some digging into this one and was able to figure out what you've got.
My initial assumption was that the salt was null and that what you had was equivalent to "$6$rounds=5000$$", which assu... |
|
epixoip |
hashcat
|
4 |
5,167 |
06-29-2017, 11:00 PM |
|
|
Thread: SHA512 without salt
Post: RE: SHA512 without salt
Yeah, I'm going to open an issue for a few cases I ran into. Some quick examples:
When I input `$6$$rounds=5$gTCqLuWl...` hashcat turns it into `$6$$rounds65qgTCqLuWl...`
When I input `$6$rounds=500... |
|
epixoip |
hashcat
|
4 |
5,167 |
06-30-2017, 05:26 PM |
|
|
Thread: sha512 Unix
Post: RE: sha512 Unix
sha512crypt (-m 1800) support was added in -plus v0.09 and -lite v0.10 |
|
epixoip |
Very old oclHashcat-lite Support
|
9 |
20,265 |
10-14-2012, 03:30 AM |
|
|
Thread: sha512 Unix
Post: RE: sha512 Unix
DiG Wrote: (10-15-2012, 12:43 AM)
--
Not the UNIX variant if I understand correctly, hence MuMMeL's question. Hashcat-plus does implement sha512crypt but is too slow on my GPU (500c/s). I've been try... |
|
epixoip |
Very old oclHashcat-lite Support
|
9 |
20,265 |
10-16-2012, 01:05 AM |
|
|
Thread: sha512 line length exception
Post: RE: sha512 line length exception
$6$ hashes in /etc/shadow are not sha512($salt.$pass). try harder. |
|
epixoip |
General Help
|
2 |
7,056 |
03-28-2013, 05:23 AM |
|
|
Thread: SHA256 bug when salt is really big?
Post: RE: SHA256 bug when salt is really big?
oclHaschat only implements a single block of sha256, therefore total input (salt + plain) cannot exceed the size of one block. |
|
epixoip |
Old oclHashcat Support
|
9 |
16,286 |
02-13-2014, 08:35 PM |
|
|
Thread: SHA256 bug when salt is really big?
Post: RE: SHA256 bug when salt is really big?
|
epixoip |
Old oclHashcat Support
|
9 |
16,286 |
02-13-2014, 08:57 PM |
|
|
Thread: SHA256 bug when salt is really big?
Post: RE: SHA256 bug when salt is really big?
yes. and it does crack the password. except there does seem to be a bug as it does mangle up the plaintext.
Code:
--
epixoip@token:~/oclHashcat-1.02$ ./oclHashcat64.bin -d 1 -n 1 -m 1410 ~/example_... |
|
epixoip |
Old oclHashcat Support
|
9 |
16,286 |
02-13-2014, 09:16 PM |
|
|
Thread: SHA256 bug when salt is really big?
Post: RE: SHA256 bug when salt is really big?
Ah ok, yeah, that's more clear. So yes, you should file a bug report about this on Trac. Might also want to include the bug in my example as well, where it cracked "1234567" as "4321[76" (not just a d... |
|
epixoip |
Old oclHashcat Support
|
9 |
16,286 |
02-13-2014, 09:59 PM |
|
|
Thread: SHA256
Post: RE: SHA256
|
epixoip |
Very old oclHashcat-plus Support
|
8 |
20,821 |
11-25-2013, 10:54 AM |
|
|
Thread: SHA1 underscore salted ?
Post: RE: SHA1 underscore salted ?
just add an underscore to the end of each salt and use the 'u' rule.
Edit: aww, Rolf beat me to it. |
|
epixoip |
General Help
|
9 |
15,119 |
02-26-2013, 08:07 PM |
|
|
Thread: SHA1 underscore salted ?
Post: RE: SHA1 underscore salted ?
i do not know if the string parser will be confused by the second : or not, too lazy to test, but if it is, you could always just use a hexsalt. |
|
epixoip |
General Help
|
9 |
15,119 |
02-27-2013, 01:15 PM |