hashcat Forum
Distributed Computing for cracking a long passwd - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-lite Support (https://hashcat.net/forum/forum-22.html)
+--- Thread: Distributed Computing for cracking a long passwd (/thread-1371.html)

Pages: 1 2 3


RE: Distributed Computing for cracking a long passwd - HelloShitty - 07-25-2012

Ok...

So that will produce a number like x.xxx X 10^30, right?

So how am i going to split the workload?


RE: Distributed Computing for cracking a long passwd - undeath - 07-25-2012

y u so funny.


RE: Distributed Computing for cracking a long passwd - HelloShitty - 07-26-2012

(07-09-2012, 09:48 AM)atom Wrote:
(07-09-2012, 04:44 AM)epixoip Wrote: oclhashcat cannot crack passwords > 16 chars.

True, but oclHashcat-lite and hashcat CPU can. The problem is that the first 4 chars can not be static or you will loose all the performance.

In hashcat CPU you can also use this format:

hashConfusedalt

where salt is the fixed string you know and then use an appropriate salted algorithm type (if it exists).

(07-25-2012, 07:56 PM)undeath Wrote: y u so funny.

I don't understand your sarcasm but that's ok...

I'm out... I have downloaded another app to do the distributed workload and it's already running...