Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: When CPU at 100%, loss of ocl performance ?
Post: When CPU at 100%, loss of ocl performance ?
Hello,
I use ocl v1.00 and I noticed a huge loss of performance when my CPU is also busy.
Few figures :
- CPU 0% -> oclhashcat algo LM is at 800Mh/s
- CPU is at 100% -> oclhashcat algo LM is at 200Mh... |
|
Mem5 |
Old oclHashcat Support
|
3 |
6,746 |
12-22-2013, 09:39 AM |
|
|
Thread: When CPU at 100%, loss of ocl performance ?
Post: RE: When CPU at 100%, loss of ocl performance ?
oclhashcat command line is already with -a (I do a digits only bruteforce on WPA) so no dictonnary needed).
With ocl-plus 0.15 it works ok but not anymore with v1.00.
Graphic card : MSI R7970 Twin F... |
|
Mem5 |
Old oclHashcat Support
|
3 |
6,746 |
12-23-2013, 09:21 AM |
|
|
Thread: wpa/wpa2 help
Post: RE: wpa/wpa2 help
Check here : https://golubev.com/gpuest.htm |
|
Mem5 |
Old oclHashcat Support
|
8 |
13,256 |
12-29-2013, 12:17 PM |
|
|
Thread: OS X Bug ? Or.. ?
Post: OS X Bug ? Or.. ?
Hi,
A hash is cracked but no plain text !
Last version of ocl.
Code:
--
oclHashcat64.exe --outfile-format=7 -o rs.txt -m 122 hash.txt dic.txt
--
hash.txt contains the hash (fa86cdace0a74fbb97dc... |
|
Mem5 |
Old oclHashcat Support
|
4 |
7,195 |
01-10-2014, 03:42 PM |
|
|
Thread: OS X Bug ? Or.. ?
Post: RE: OS X Bug ? Or.. ?
Thanks, but the empty hash is 3E8ED8FC0C6AC6C17CB6EFCBE43BF31E765F8F456B2A6500
this thread https://hashcat.net/forum/thread-1360-post-7493.html said that.
i am confused :s
atom Wrote:
--
Yes, its an ... |
|
Mem5 |
Old oclHashcat Support
|
4 |
7,195 |
01-10-2014, 11:44 PM |
|
|
Thread: OS X Bug ? Or.. ?
Post: RE: OS X Bug ? Or.. ?
Humm right I got it. I forgot the salt.
Is there a way to know when a hash is the empty string or not ?
Thank you. |
|
Mem5 |
Old oclHashcat Support
|
4 |
7,195 |
01-11-2014, 04:27 PM |
|
|
Thread: O H/sec with PhpBB
Post: O H/sec with PhpBB
Hi,
Considering thousand of PHPBB hashes.
I launched a dictionnary attack, I got ~400 H/sec.
GPU : 7970.
I then lauch a bruteforce attack on digits :
Code:
--
oclhashcat64.exe --remove -n... |
|
Mem5 |
Old oclHashcat Support
|
10 |
23,751 |
01-12-2014, 11:13 PM |
|
|
Thread: O H/sec with PhpBB
Post: RE: O H/sec with PhpBB
It's the same without -n and -u |
|
Mem5 |
Old oclHashcat Support
|
10 |
23,751 |
01-12-2014, 11:51 PM |
|
|
Thread: O H/sec with PhpBB
Post: RE: O H/sec with PhpBB
Does this imply a hashes limit ?
I should divide the list in 2 or 3 or more ? |
|
Mem5 |
Old oclHashcat Support
|
10 |
23,751 |
01-13-2014, 09:02 AM |
|
|
Thread: O H/sec with PhpBB
Post: RE: O H/sec with PhpBB
Ok.
Quote:
--
this is accomplished by stacking your attacks in probabilistic order, so that you remove as many salts as possible in your first few passes
--
How can I do that ? |
|
Mem5 |
Old oclHashcat Support
|
10 |
23,751 |
01-13-2014, 02:47 PM |
|
|
Thread: O H/sec with PhpBB
Post: RE: O H/sec with PhpBB
Hum.
I mean, I am not english, and I did not really understand what epixoip explained, especially last sentence.
If I remove (erase?) salts, I also delete the hash, right ? but that is not what I wa... |
|
Mem5 |
Old oclHashcat Support
|
10 |
23,751 |
01-13-2014, 05:35 PM |
|
|
Thread: O H/sec with PhpBB
Post: RE: O H/sec with PhpBB
Oh yes I got it. I have already done that. The list was bigger at the beginning. |
|
Mem5 |
Old oclHashcat Support
|
10 |
23,751 |
01-13-2014, 08:12 PM |
|
|
Thread: Openwall cracker ?!
Post: Openwall cracker ?!
Hi,
Have you seen this twitt ?
https://twitter.com/HashSuite/status/427671690319892480
Quote:
--
As far as we're aware, Hash Suite 3.0 is now world's fastest LM hash cracker on CPU and GPU: 53... |
|
Mem5 |
Old oclHashcat Support
|
4 |
11,025 |
01-27-2014, 07:06 PM |
|
|
Thread: Openwall cracker ?!
Post: RE: Openwall cracker ?!
atom Wrote: (01-27-2014, 07:20 PM)
--
The original bitslice DES/LM source was posted on reddit a while back and at this time it was doing around 3000M c/s. I was able to improve it to around 6400M c/... |
|
Mem5 |
Old oclHashcat Support
|
4 |
11,025 |
01-29-2014, 04:40 PM |
|
|
Thread: [WPA] Link between aircrack-ng and hccap
Post: [WPA] Link between aircrack-ng and hccap
Hi,
When cracking with aircrack-ng, we can see the "Master Key", "Transient key" and "EAPOL HMAC" values. ( e.g. https://www.enterprisenetworkingplanet.com/img/2007/12/aircrack_fig5.png )
Is there a ... |
|
Mem5 |
Old oclHashcat Support
|
1 |
7,360 |
01-30-2014, 04:28 PM |
|
|
Thread: Openwall cracker ?!
Post: RE: Openwall cracker ?!
Considering oclhashcat last version and this command line :
Code:
--
-a 3 -m 3000 -n 160 --markov-disable -i --increment-min 1 --increment-max 7 -1 ?u?d?s 1000_hashes.txt ?1?1?1?1?1?1?1
--
Speed i... |
|
Mem5 |
Old oclHashcat Support
|
4 |
11,025 |
01-30-2014, 06:55 PM |
|
|
Thread: How To Use New Oclhashcat?
Post: RE: How To Use New Oclhashcat?
- If you want to bruteforce, you must specify it with "-a 3"
- If you want to use wordlist, oclhashcat is waiting for a dictionnary file, that's why you have "?d?d?d?d?d?d?d?d: No such file or direc... |
|
Mem5 |
Old oclHashcat Support
|
11 |
49,039 |
01-31-2014, 10:02 PM |
|
|
Thread: How To Use New Oclhashcat?
Post: RE: How To Use New Oclhashcat?
Roham Soroush Wrote: (01-31-2014, 06:38 AM)
--
'cudaoclhashcat64.exe' is not recognized as an internal or external command, operable program or batch file.
--
1/ First learn to use your keyboard !
2... |
|
Mem5 |
Old oclHashcat Support
|
11 |
49,039 |
02-01-2014, 11:15 AM |
|
|
Thread: hash of a hash
Post: RE: hash of a hash
Your SHA256 hash is a plain-text for RIPEMD160.
So you consider it as a classic password. You know the length (64 characters) and the charset (hexadecimal).
But your problem here is that 64 characters... |
|
Mem5 |
Old oclHashcat Support
|
2 |
4,936 |
03-02-2014, 11:53 AM |
|
|
Thread: Output password verbose viewing for wpa-wpa2?
Post: RE: Output password verbose viewing for wpa-wpa2?
You can use the tool maskprocessor to see your generated words in output. |
|
Mem5 |
Old oclHashcat Support
|
6 |
15,082 |
03-24-2014, 09:26 AM |