Posts: 620
	Threads: 57
	Joined: May 2010
	
	
 
	
	
		 (08-17-2012, 08:17 PM)proinside Wrote:  mastercracker, you mean simple dictionary with no rules at all ?
I don't want to "waste" time cleaning the actual driver to install
a new version that do not brings nothing new about this specific
problem. Tks.
Yes, simple dictionary attack works.  I did not test with rules so I don't know.  For sure, combination, bruteforce and both hybrid attack fails.  Those are the -a 1, -a 3, -a 6 and -a 7.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 5,232
	Threads: 233
	Joined: Apr 2010
	
	
 
	
	
		@mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711).
	
	
	
	
	
 
 
	
	
	
		
	Posts: 620
	Threads: 57
	Joined: May 2010
	
	
 
	
	
		 (08-17-2012, 11:42 PM)atom Wrote:  @mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711).
You are right Atom.  -m 2611 works completely. -m 2711 and -m 2811 works only with dictionary mode.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 124
	Threads: 12
	Joined: Apr 2010
	
	
 
	
	
		1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist.
sha512($pass.$salt)
0/663
I also tested to crack a single hash but it failed.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 620
	Threads: 57
	Joined: May 2010
	
	
 
	
	
		 (08-18-2012, 10:36 AM)K9 Wrote:  1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist.
sha512($pass.$salt)
0/663
I also tested to crack a single hash but it failed.
Yes, it depends on which oclhashcat-plus version you use.  In the latest beta, it's almost completely fixed.  At least for my HD5750 using catalyst 12.8.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 124
	Threads: 12
	Joined: Apr 2010
	
	
 
	
	
		It is working with small salts but there is a problem with longer salts I think. I sent you a file via pm.