Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: slow using rules
Post: slow using rules
First time using rules and noticed the h/s is very very slow when using them. Is it possible to create a dict file with the rules already applied to a dict set so that I can go back to normal h/s. |
|
enervate |
hashcat
|
7 |
1,051 |
07-28-2020, 04:27 PM |
|
|
Thread: slow using rules
Post: RE: slow using rules
undeath Wrote: (07-28-2020, 05:08 PM)
--
Without knowing how exactly your command line is looking and what numbers you are comparing it's impossible to properly answer this. Please provide more detai... |
|
enervate |
hashcat
|
7 |
1,051 |
07-28-2020, 06:33 PM |
|
|
Thread: slow using rules
Post: RE: slow using rules
Mem5 Wrote: (07-28-2020, 07:51 PM)
--
11300 (bitcoin) is slow, you can get around 11"665 H/s with a RTX 2080 Ti (source (https://www.onlinehashcrack.com/tools-benchmark-hashcat-gtx-1080-ti-1070-ti-rt... |
|
enervate |
hashcat
|
7 |
1,051 |
07-28-2020, 08:10 PM |
|
|
Thread: slow using rules
Post: RE: slow using rules
philsmd Wrote: (07-28-2020, 09:07 PM)
--
try with
Code:
--
-S
--
added to your command line.
Alternatively, you could generate a new dict or use stdin/pipe, but first test with -S added to... |
|
enervate |
hashcat
|
7 |
1,051 |
07-28-2020, 10:14 PM |
|
|
Thread: ethereum scrypt
Post: ethereum scrypt
I understand scrypt is gpu-resistant, so what is the ideal brute force scenario that is feasible for cracking scrypt? Is it possible to use multiple cpu cores to speed up the effort? Is there an ideal... |
|
enervate |
hashcat
|
4 |
704 |
07-27-2020, 03:17 AM |