Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
GPU is usually better.
There's no way to use more memory at the hashcat level. Some background on the 25% memory cap is here (https://devtalk.nvidia.com/default/topic/992502/cuda-programming-and-per... |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 08:11 AM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
I don't know a lot about Mac hardware, but I would assume that this is because the GPU in that unit is slower than the CPU? In my experience, the GPU is usually better, though, so someone else may kno... |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 08:37 AM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
That definitely works. Orient yourself with your command line.
Code:
--
$ hashcat -b -m 0
hashcat (v3.30-317-g778f568) starting in benchmark mode...
OpenCL Platform #1: NVIDIA Corporation
===... |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 05:58 PM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
Also note that the "maximum power" you mentioned early is memory size, which has no relationship to speed. |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 06:00 PM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
In the posted benchmarks, your GPU performance is roughly an order of magnitude better than your CPU performance. |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 08:32 PM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
You said your CPU was better than your GPU. This is not correct. Your GPU is much better. How much RAM you're using only matters when using large lists of rules, etc. |
|
royce |
hashcat
|
21 |
44,484 |
02-27-2017, 02:58 AM |
|
|
Thread: Crack a long list efficiently
Post: RE: Crack a long list efficiently
Of course hashcat does this - even if there are different salts. Anything else would be bizarre. |
|
royce |
hashcat
|
10 |
11,854 |
08-13-2016, 04:29 PM |
|
|
Thread: Crack pbkdf2
Post: RE: Crack pbkdf2
Please see the forum rules. Posting hashes is not allowed. I have redacted your hash.
https://hashcat.net/forum/archive/index.php?announcement-2.html
There are a number of tutorials showing basi... |
|
royce |
hashcat
|
7 |
1,454 |
03-29-2020, 04:33 AM |
|
|
Thread: Cracking a Truecrypt Container
Post: RE: Cracking a Truecrypt Container
That's hashcat mode 6223 (where 3 = "all" (all three algorithms)):
Code:
--
62XY | TrueCrypt | Full-Disk Encryption (FDE)
...
�... |
|
royce |
hashcat
|
2 |
3,013 |
01-27-2019, 10:30 PM |
|
|
Thread: Cracking descrypt
Post: RE: Cracking descrypt
Here's one for ZTEX -- source code, but no bitstream.
https://github.com/Gifts/descrypt-ztex-bruteforcer |
|
royce |
General Help
|
3 |
7,718 |
11-08-2015, 08:54 AM |
|
|
Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters
This Stackexchange thread may be informative - it has some examples:
https://security.stackexchange.com/questions/154901/attack-wpa-password-with-hashcat-settings-and-resources-for-german-passwords/1... |
|
royce |
hashcat
|
4 |
3,252 |
01-29-2019, 03:09 AM |
|
|
Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters
It's often better to encode the custom charsets in the mask file itself, because it's persistent documentation of the nature of the attack that lives beyond that particular commandline. |
|
royce |
hashcat
|
4 |
3,252 |
01-30-2019, 05:12 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
There is nothing unusual about the 2012-era LinkedIn SHA1 hashes - they're generic raw SHA1.
There is only one version of hashcat now - does OpenCL or CUDA (but at least one is required, for either... |
|
royce |
hashcat
|
7 |
873 |
08-10-2020, 05:45 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
Lol -and apparently I used to know this (2017) ... and totally forgot! Thanks, philsmd! |
|
royce |
hashcat
|
7 |
873 |
08-10-2020, 08:45 PM |
|
|
Thread: Cracking Turkish/Foreign Hashes
Post: RE: Cracking Turkish/Foreign Hashes
What MD5 is your Python producing? I get:
Code:
--
$ echo -n 'ĞĞ' | md5sum
411019a0840fad007398bcab6cc9188c -
--
... which hashcat cracks, using your syntax:
Code:
--
$ hashcat --... |
|
royce |
hashcat
|
2 |
2,374 |
05-21-2018, 12:41 AM |
|
|
Thread: Create custom dictionary
Post: RE: Create custom dictionary
Welcome!
Instead of generating a custom dictionary, you're looking for a hybrid or rules-based attack, I think. With these attacks, each word in your dictionary is dynamically modified many times,�... |
|
royce |
hashcat
|
8 |
13,923 |
04-25-2017, 03:02 PM |
|
|
Thread: Create custom dictionary
Post: RE: Create custom dictionary
Good question, jallis.
devilman666, since the order is always the same, the example that I provided should apply to your case. |
|
royce |
hashcat
|
8 |
13,923 |
04-25-2017, 03:46 PM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
Crunch is unnecessary for most attacks:
* Limiting duplicate characters is not worth the sacrifice in speed
* Resumption of candidate generation is built in natively to hashcat
Generating candi... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 05:19 AM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
If your target password is likely less than the max supported by an optimized kernel, adding "-O" to your command line will be significantly faster. This max value varies from hashtype to hashtype - c... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 04:55 PM |
|
|
Thread: csv output for benchmarking
Post: RE: csv output for benchmarking
There is also:
hashcat -b --machine-readable |
|
royce |
User Contributions
|
1 |
3,940 |
02-19-2017, 03:45 AM |