Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Automated Tests for Beta Testers
Post: RE: Automated Tests for Beta Testers
In my case, I just did the full test with 1 x GTX470 and 2 x GTX460 on the same setup posted above for the GTX470 and everything is the same (all good except the 2 -m 6500 hashes). |
|
mastercracker |
Beta Tester
|
22 |
28,383 |
12-02-2013, 06:44 AM |
|
|
Thread: Automated Tests for Beta Testers
Post: RE: Automated Tests for Beta Testers
"Bug" reproduced on the Nvidia side. Windows 7, 64 bit, Driver 320.49, GTX470
Code:
--
[ len 11 ] ERROR: cannot open '{ssha512}06$4818543662046424$nLXETd7BMlvBpunnC2OEKIiKZpkpENAC4T3wVneRlxTAfInv6d... |
|
mastercracker |
Beta Tester
|
22 |
28,383 |
12-01-2013, 06:17 AM |
|
|
Thread: Restore bugs thread
Post: Restore bugs thread
Hi. I know these has been reported in the trac (#203 and #90) already but they are still present in the beta62. I am willing now to take the time to help in troubleshooting them in a reasonable time... |
|
mastercracker |
Beta Tester
|
2 |
4,385 |
12-05-2013, 08:19 PM |
|
|
Thread: Restore bugs thread
Post: RE: Restore bugs thread
Files have been sent to atom via email. |
|
mastercracker |
Beta Tester
|
2 |
4,385 |
12-07-2013, 10:41 PM |
|
|
Thread: Restore bugs thread
Post: RE: Restore bugs thread
Another thing that I have noticed is that when it gives the error message, it's just after loading the devices and it says that it skipped the devices other than the #1. It's weird that it know that ... |
|
mastercracker |
Beta Tester
|
2 |
4,385 |
12-11-2013, 01:14 PM |
|
|
Thread: --debug option
Post: RE: --debug option
I would be in favor of it. You can "push" a lot more of rules onto gpu than on CPU. Again, this is all in the goal of determining what would be the best rules to use with each wordlists. Being able... |
|
mastercracker |
Beta Tester
|
8 |
10,394 |
02-06-2014, 10:54 PM |
|
|
Thread: --debug option
Post: RE: --debug option
Amazing. I will try it when I will go back home. |
|
mastercracker |
Beta Tester
|
8 |
10,394 |
02-12-2014, 07:46 PM |
|
|
Thread: --debug option
Post: RE: --debug option
I have found a bug with the debug feature (mode 3) in OclHashcat. If you crack a password with 14 or 15 rules you get long lines full of nulls and weird characters. Those cannot be pasted here so th... |
|
mastercracker |
Beta Tester
|
8 |
10,394 |
03-02-2014, 06:23 AM |
|
|
Thread: A third slot for Oclhashcat
Post: A third slot for Oclhashcat
What I am suggesting might just be too long to do or not feasible at all but if it is not too hard here's the idea. Right now, Oclhashcat has what I would call 2 slots where you can put either a word... |
|
mastercracker |
Feature Requests
|
5 |
15,381 |
05-23-2010, 05:29 PM |
|
|
Thread: A third slot for Oclhashcat
Post: RE: A third slot for Oclhashcat
atom Wrote: (05-23-2010, 07:05 PM)
--
btw, in v0.19 you can emulate it by using -m 2 or -m 1. just add the words you want as 3rd concatination as salts. results are the same.
--
I don't see how it wo... |
|
mastercracker |
Feature Requests
|
5 |
15,381 |
05-24-2010, 04:14 AM |
|
|
Thread: A third slot for Oclhashcat
Post: RE: A third slot for Oclhashcat
Is there any switch in OclHashcat that allows the use a file containing the salts like in Hashcat? |
|
mastercracker |
Feature Requests
|
5 |
15,381 |
05-24-2010, 08:09 PM |
|
|
Thread: Per position charset support
Post: RE: Per position charset support
thorsheim Wrote: (06-07-2010, 11:29 PM)
--
Let me explain a bit more. I do password analysis, primarily of Windows LM/NTLM hashes. dictionary/hybrid/RT/bruteforce, you name it.
I've got some persona... |
|
mastercracker |
Feature Requests
|
4 |
11,977 |
06-08-2010, 05:05 AM |
|
|
Thread: Hash deletion
Post: Hash deletion
Hi. It would be nice if the program would delete the hash from the list once it's cracked. This way, by running multiple attacks one after the other (like in a .bat file), you don't have to worry ab... |
|
mastercracker |
Feature Requests
|
1 |
6,118 |
06-12-2010, 07:25 AM |
|
|
Thread: oclHashcat - Single worlist attack
Post: RE: oclHashcat - Single worlist attack
For Lemon and Vector. If you absolutely want to do the equivalent of a dictionary attack on OclHashcat, you can do the following:
Code:
--
oclHashcat.exe -o output.txt -1 ?s?d?u?l example.hash exam... |
|
mastercracker |
Feature Requests
|
6 |
13,359 |
06-19-2010, 03:13 AM |
|
|
Thread: oclhashcat GUI needed ; I even pay $$ !
Post: RE: oclhashcat GUI needed ; I even pay $$ !
rafuter Wrote: (10-13-2010, 04:10 PM)
--
nobody ? :(
--
Just curious. How much are you willing to pay? |
|
mastercracker |
Feature Requests
|
16 |
31,578 |
10-15-2010, 02:47 AM |
|
|
Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC
Rolf Wrote: (10-21-2010, 12:47 PM)
--
I'd wish to see it.:)
It may not be bitsliced.
Ofc, it may not be possible to implement with current oclhc architecture(because of 7+7 password length limit).
... |
|
mastercracker |
Feature Requests
|
31 |
77,613 |
10-22-2010, 03:06 PM |
|
|
Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC
In the mean time, you could create a private small database containing the list of all the 16 hex chars (meaning both halves of the LM hash) from the full LM hash that has been cracked. You can then ... |
|
mastercracker |
Feature Requests
|
31 |
77,613 |
11-19-2010, 07:58 PM |
|
|
Thread: Have a username file like the salt file
Post: RE: Have a username file like the salt file
I don't remember if Atom implemented the -e for DCC. Worth trying it if you have not yet... |
|
mastercracker |
Feature Requests
|
4 |
10,510 |
12-02-2010, 03:42 PM |
|
|
Thread: GUI update
Post: GUI update
This is probably for Hakre... There is no place to select the --remove option and since the loading of previously cracked password is out now, it's a waste of time to always recrack the same password... |
|
mastercracker |
Feature Requests
|
3 |
8,155 |
12-05-2010, 06:41 AM |
|
|
Thread: 2 in 1
Post: 2 in 1
2 quick questions:
1) Can we expect a public version of OCLhashcat+ soon?
2) I want to renew my request for the md5(md5($salt).md5($pass)) algorithm in OCLhashcat. |
|
mastercracker |
Feature Requests
|
3 |
8,720 |
01-21-2011, 06:19 PM |