![]() |
My bugs for v0.09b41 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Developer (https://hashcat.net/forum/forum-39.html) +--- Forum: Beta Tester (https://hashcat.net/forum/forum-31.html) +--- Thread: My bugs for v0.09b41 (/thread-1430.html) Pages:
1
2
|
RE: My bugs for v0.09b41 - atom - 08-10-2012 Fixed: Quote:- For -m 10 md5($pass.$salt), Bruteforce of length 2 is not working. RE: My bugs for v0.09b41 - atom - 08-10-2012 Fixed: Quote:Prompt is not shown sometimes RE: My bugs for v0.09b41 - atom - 08-10-2012 Left: Quote:- For -m 30 md5(unicode($pass).$salt), Length 15 does not work on all modes RE: My bugs for v0.09b41 - atom - 08-10-2012 Fixed: Quote:- For -m 30 md5(unicode($pass).$salt), Length 15 does not work on all modes Left: Quote:- For -m 111 nsldaps, SSHA-1(Base64), Netscape LDAP SSHA, Dictionary attack works (-a 0) but all the other attack mode fails. RE: My bugs for v0.09b41 - atom - 08-10-2012 Fixed: Quote:- For -m 111 nsldaps, SSHA-1(Base64), Netscape LDAP SSHA, Dictionary attack works (-a 0) but all the other attack mode fails. Left: Quote:- For -m 141 EPiServer 6.x, Nothing worked. RE: My bugs for v0.09b41 - atom - 08-10-2012 I have uploaded a new beta b43, please retry everything (not just the stuff that was marked as buggy) because of bugfixes new errors can appear somewhere. RE: My bugs for v0.09b41 - mastercracker - 08-11-2012 (08-10-2012, 11:37 AM)atom Wrote: Can not reproduce:For -m 130, I don't get the same problem on my HD5750 (on v42 only bruteforce of length 2 did not work) so it could be Nvidia specific. For -m 131, I get pretty much the same thing on both platform. Maybe the hash generation is the culprite. I will try to re-generate them and retest on v44. For -m 132, I don't get the same problem on my HD5750 (on v42 only bruteforce of length 2 did not work) so it could be Nvidia specific. For -m 1800, It seems like both platform share the same problems but with all the AMD crashes, it's hard to compare. I will try to regenerate some of the hashes and retest on v44. For -m 2100, I get the same thing on both platform but the bruteforce on AMD crashed so I don't know the exact outcome. Again, I will try to regenerate the hashes and retest on v44. RE: My bugs for v0.09b41 - mastercracker - 08-12-2012 For -m 131, I confirm that hash generation was the main source of the problem. There are still bugs however that I will report on the thread of v44. For -m 2100, I figured out the bug for the length 2 dictionary not being cracked. The hash generated by Atom's perl script was with a username of length 14. Without giving any error message, this hash that was part of a group of 25 hashes total was skipped and not included in the cracking. Generating another hash for the same password with a different user name worked properly. RE: My bugs for v0.09b41 - atom - 08-12-2012 ok i will close this thread, lets continue on the v44 |