hashcat Forum

Full Version: CL_OUT_OF_HOST_MEMORY
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello everyone

I just tried to crack an WPA hccapx file with hashcat but I got this

Code:
Crunch will now generate the following amount of data: 17575569559640669184 bytes
16761369285240 MB
16368524692 GB
15984887 TB
15610 PB
Crunch will now generate the following number of lines: 2580393341448059904
hashcat (v5.1.0) starting...

OpenCL Platform #1: The pocl project
====================================
* Device #1: pthread-AMD Ryzen 5 2600 Six-Core Processor, skipped.

OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #2: gfx1010, 6732/8176 MB allocatable, 20MCU

Hashes: 2 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63

Watchdog: Temperature abort trigger set to 90c

clCreateCommandQueue(): CL_OUT_OF_HOST_MEMORY

Started: Sat Jul 11 16:38:52 2020
Stopped: Sat Jul 11 16:38:52 2020

My computer run Ubuntu 20.04
Processor: Ryzen 5 2600
Graphic Card: Rx 5700xt (openCL is enabled)

Sorry for my English I'm french Smile
Thx for your help
1. why do you use crunch ?
2. why do you use hashcat 5.1.0 if hashcat 6.0.0 is available (https://hashcat.net/hashcat/) ?
3. what is your command ?
4. why don't you give your full specs ? if the error says "out of host memory" , you should at least specify how much RAM you have
Thank you for your answer
I will answer each of your questions

1. I use crunch to create a wordlist with all the passwords that I will test with hashcat on the file
2. Idk I just do "apt-get install hashcat" today and this is the version that was installed
3. the command is "crunch 10 20 abcdefghijklmnopqrstuvwxyz0123456789 | hashcat -m 2500 -d 2 file.hccapx"
4. I got 16GB RAM and 8GB VRAM
- you should download hashcat directly from https://hashcat.net/hashcat/
- don't use crunch, use this instead:
Code:
hashcat -m 2500 -a 0 -w 3 -r my.rule -d 2 file.hccapx dict.txt

where my.rule is a rule file like the ones in rules/ folder , but that doesn't shorten the passwords to < 8 characters
where dict.txt is a dictionary file that does contain very likely/good password candidates

This makes sense, because WPA/WPA2 has a minimum password length of 8 chars/bytes and brute-forcing (trying all these different characters) a password that is 10+ characters long is infeasible (not possible, even with a lot of GPUs)

If that command still doesn't work, try to see if a benchmark works:
Code:
hashcat -m 2500 -b
I inquired and found that hashcat 6.0.0 is only available on the latest version of ubuntu (20.10) . I update my computer and test everything
Solve !
I updated my computer to get the latest version of hashcat.
Many thanks to philsmd
Excellent!

(And just for the record, you can download hashcat 6.0.0 and run it on older versions of Ubuntu)