6970 users wanted - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: 6970 users wanted (/thread-1386.html) Pages:
1
2
|
RE: 6970 users wanted - mastercracker - 08-17-2012 (08-17-2012, 08:17 PM)proinside Wrote: mastercracker, you mean simple dictionary with no rules at all ?Yes, simple dictionary attack works. I did not test with rules so I don't know. For sure, combination, bruteforce and both hybrid attack fails. Those are the -a 1, -a 3, -a 6 and -a 7. RE: 6970 users wanted - atom - 08-17-2012 @mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711). RE: 6970 users wanted - mastercracker - 08-18-2012 (08-17-2012, 11:42 PM)atom Wrote: @mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711).You are right Atom. -m 2611 works completely. -m 2711 and -m 2811 works only with dictionary mode. RE: 6970 users wanted - K9 - 08-18-2012 1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist. sha512($pass.$salt) 0/663 I also tested to crack a single hash but it failed. RE: 6970 users wanted - mastercracker - 08-18-2012 (08-18-2012, 10:36 AM)K9 Wrote: 1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist.Yes, it depends on which oclhashcat-plus version you use. In the latest beta, it's almost completely fixed. At least for my HD5750 using catalyst 12.8. RE: 6970 users wanted - K9 - 08-19-2012 It is working with small salts but there is a problem with longer salts I think. I sent you a file via pm. |