08-06-2012, 02:03 PM
looks perfect, whats the problem?
Hashcat - OSX
|
08-06-2012, 02:03 PM
looks perfect, whats the problem?
(08-06-2012, 02:03 PM)atom Wrote: looks perfect, whats the problem? Hi Atom, No problem at all, all is ok, just whant to know how to reduce the number of working Core's, like you can see in the screen capture all 8 one's are running & that not permited me to run another extra "app", so i just say & imagine the Option = "-n" can do the job ? can you confim please ? Beside, with hashcat may exist an "--test" option for benchmark all the avaible hashes / algo's ? ( i see many members here on board on "Hardware section" posted them bench's, or maybe it's an option avaible only on OclHashcat ? Anyway, i'm just really happy & enjoy a lot to be able to use hashcat on MAC, hope you can launch ASAP the GPU compatible version ;-))) Thanks again for all your effort's, Regards, Tony
08-06-2012, 02:57 PM
yes you can use -n
benchmark is not planed yet - you can still do your own as you already did.
08-06-2012, 03:10 PM
Hi,
I have one question about the "Hybrid" attack mode, like i see it's seem not operated in hashcat & avaible only on OCLHashcat suites. Like it's mentioned here : http://hashcat.net/wiki/hybrid_attack So my question, it's : May exist another way to play with Mask & DIC's or only RULES + DIC'S are avaible for hashcat ? it will be nice to have the avaibility to play with Mask's on the right & left of an dic.. & in function of your reply in the case is negative, may you plan to implemented this function to Hashcat ? Thanks in advance, Regards, Tony
08-09-2012, 11:02 AM
No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki);
http://hashcat.net/wiki/hybrid_atttack_with_rules
08-09-2012, 01:52 PM
(08-09-2012, 11:02 AM)atom Wrote: No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki); Hi Atom, Thanks for reply, yep i see that, but no yet on Mac_OSX i think ;-) ( $ ./mp64.bin ====> bynaries = Linux...maybe you plan to compiled the source for an OSX compatible ? ) Regards, Tony
08-09-2012, 03:02 PM
(08-09-2012, 01:52 PM)tony Wrote:(08-09-2012, 11:02 AM)atom Wrote: No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki); Aren't the sources included? You should be able to compile it yourself.
08-09-2012, 03:51 PM
(08-09-2012, 03:02 PM)radix Wrote:(08-09-2012, 01:52 PM)tony Wrote:(08-09-2012, 11:02 AM)atom Wrote: No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki); Hi Radix, No it seem only avaible with the Bynaries for Linux & Win = http://hashcat.net/wiki/maskprocessor Just download it & i find inside only ".bin" & ".exe" in the case we talk about Maskprocessor for sure, cause i see : $./mp64 so i imagine is that one.... Thanks, Tony
08-10-2012, 11:10 AM
No, maskprocessor is closed source. But all that counts for you is the outfile. So you can generate the outfile on Linux or Windows and copy it to Mac
|
« Next Oldest | Next Newest »
|