V47 bugs AMD - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Developer (https://hashcat.net/forum/forum-39.html) +--- Forum: Beta Tester (https://hashcat.net/forum/forum-31.html) +--- Thread: V47 bugs AMD (/thread-1466.html) |
RE: V47 bugs AMD - atom - 08-21-2012 I am not sure. My testhashes look like this: echo -n 1306 | ./oclHashcat-plus64.bin -m 141 '$episerver$*0*Mzc2NzY1NTU0MTM3NDIxOA==*ITBVvl4lw3w7UGLk/soqInuRkos=' echo -n 56038 | ./oclHashcat-plus64.bin -m 141 '$episerver$*0*NzI0NjAwMzYyNTUxMjU4Mw==*/3ZbqTedR8MRWeNe5I6kg5G330s=' RE: V47 bugs AMD - mastercracker - 08-21-2012 (08-21-2012, 08:38 PM)atom Wrote: I am not sure. My testhashes look like this:Ah, I see. Here's what seems to be the problem. I don't know how the algorithm is supposed to work but it looks like the first part after the $episerver$*0* is the salt in base64 and the last part after the ==* is the hashed password in base64. For my hashes, the last part is the same length as yours. The problem is with the salt. Mine are of various length and never as long as yours. So either the algo is supposed to use variable length salt and you need to implement the acceptation of different total hash length by OCLhashcat-plus (that's the error I was getting "length exception error") or if it is supposed to be fixed, then maybe I have installed the wrong perl module for that algo and got wrong hashes generated. In the latter case, can you hash for me the following passwords with that algo so that I can test properly: Code: mc RE: V47 bugs AMD - atom - 08-22-2012 Dynamic salt length should work now (New version uploaded). Here are the requested hashes: Quote:$episerver$*0*NzYyNDg4MDUxMTEx*IdPKaPmk3qyjeth39wskfa3Uei4= RE: V47 bugs AMD - mastercracker - 08-22-2012 Yep, now -m 141 is fully functional. I used my original hashes to test and everything was fine. RE: V47 bugs AMD - atom - 08-23-2012 I tried to fix the bugs with 2711 and 2811 but they are driver related. Next thing is this: Quote:- Progress and rejected counters wrong. @mastercracker: How can I reproduce? RE: V47 bugs AMD - K9 - 08-23-2012 There is a problem with long salts at m1710. If the salts are small it works. Is this also driver related? RE: V47 bugs AMD - atom - 08-23-2012 It depends on what you define a long salt. On -m 1710 supported are salts up to length 16. RE: V47 bugs AMD - K9 - 08-23-2012 The salt lenght is 31 RE: V47 bugs AMD - atom - 08-23-2012 yeah ok, that wont work RE: V47 bugs AMD - atom - 08-29-2012 Quote:- For -m 1710 sha512($pass.$salt), Bruteforce on length 4 fails. Everything else works. Should be fixed with b55, please test. |