Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

oclHashcat-plus 0.071 crashes when using brute-force option
#1
Version: oclHashcat-plus 0.071
OS: Windows 7 64-bit
GPU: NVidia GTX 580

I am using the following command:
cudaHashcat-plus64.exe -m 500 mypasswd -a 3 -1 ?l?u?d?s?F ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1

This runs fine, but as soon as I press the "s" key to see the status it crashes just after outputting the running time, for example:

Code:
s
Status.......: Running
Input.Mode...: Mask (?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1)
Hash.Target..: $1$aaaaa$bbbbbbbbbbbbbbbbbbbbbbbb
Hash.Type....: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
Time.Running.: 7 hours, 36 mins


The details of the crash are as follows:

Code:
Problem signature:
  Problem Event Name:    APPCRASH
  Application Name:    cudaHashcat-plus64.exe
  Application Version:    0.0.0.0
  Application Timestamp:    4f5e2a04
  Fault Module Name:    cudaHashcat-plus64.exe
  Fault Module Version:    0.0.0.0
  Fault Module Timestamp:    4f5e2a04
  Exception Code:    c0000005
  Exception Offset:    000000000000e085
  OS Version:    6.1.7601.2.1.0.256.1
  Locale ID:    1033
  Additional Information 1:    8cbd
  Additional Information 2:    8cbd2804446ee4564ba177f993a82b9f
  Additional Information 3:    cdbf
  Additional Information 4:    cdbf9001a1bcc5cd8036d8251882d511

FYI, the dictionary attack mode does not crash when I check the status.


One follow-up question. How do you specify the password length when using the brute-force attack mode ? No matter what mask I put, it always outputs the following line:

Code:
Password lengths range: 1 - 15


One more thing. "cudaHashcat-plus64.exe -V" still shows 0.07 instead of 0.071.
#2
I had the same problem when I used too many charsets :p
#3
Thanks for confirming.

Just did some further testing and with a charset of ?l?u?d?s?F it crashes as soon as I specify a mask of 8 or more characters. While testing I noticed that the "Password lengths range: 1 - 15" only seems to be a cosmetic bug, assuming it should reflect the amount of characters in the mask.

For what it's worth, it also crashes with a charset of ?1 and a mask of 12 or more characters.
#4
(04-27-2012, 12:32 PM)LarryX Wrote: . While testing I noticed that the "Password lengths range: 1 - 15" only seems to be a cosmetic bug, assuming it should reflect the amount of characters in the mask.

Yes and no. For example a mask length 16 can not display Password lengths range: 1 - 16 since oclHashcat-plus supports cracking only up to lenght 15.
#5
(04-27-2012, 12:58 PM)atom Wrote: Yes and no. For example a mask length 16 can not display Password lengths range: 1 - 16 since oclHashcat-plus supports cracking only up to lenght 15.

Yes I noticed that. I initially had a mask of 16. The process starts just fine, but then I noticed that my GPU usage was around 0%. I think in a future version there should be an error message when someone tries to use a length of more than 15.

I'm obviously also hoping that the crash will be fixed at some point Smile
#6
You are absolutly right. I have already fixed it:

Quote:root@ht:~/oclHashcat-plus-0.08# ./cudaHashcat-plus64.bin -m 500 example500.hash -a 3 -1 ?l?u?d?s?F ?1?1?1?1?1?1?1?1?1?1?1 --quiet
ERROR: To many combinations
root@ht:~/oclHashcat-plus-0.08#

Thanks for reporting!
#7
Thanks!