hashcat Forum
Not enough allocatable device memory for this attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Not enough allocatable device memory for this attack (/thread-10791.html)



Not enough allocatable device memory for this attack - Clay - 05-26-2022

Hi,
I just wanted to decode the one password, just comparing one decoded password with password to crack (not the brutal force), and I get the below output (attachments)

What can I do? Its just one easy comparing, the files are almost empty as I said, just one string in hashes.txt and passwordtocrack.txt as well. Process takes a long time and never ends.
Thanks


RE: Not enough allocatable device memory for this attack - Snoopy - 05-27-2022

(05-26-2022, 12:24 PM)Clay Wrote: Hi,
I just wanted to decode the one password, just comparing one decoded password with password to crack (not the brutal force), and I get the below output (attachments)

What can I do? Its just one easy comparing, the files are almost empty as I said, just one string in hashes.txt and passwordtocrack.txt as well. Process takes a long time and never ends.
Thanks

your commandline is wrong, please remove the spaces between -O and the -o, also remove the -o

try

Code:
hashcat -a0 -m1800 -O hashes.txt passwordtocrack.txt

(if you look closely, hashcat things you want to supply the passwords by stdin/pipe mode)

next thing, if you are on linux anyway, try this
Code:
mkpasswd -m sha512crypt 1234
and you get this 
Code:
$6$cfgd3GmvI9XaIXQq$Bd0UUdPiNU4Hy0vw7Yqnsy6m0zyp4ZkHMsOX1Zkd5MLKDV5VqMs/aeTdLS2f/MSiz7Tv5JoVKTqlsf2kWTWPb0

so just 

Code:
mkpasswd -m sha512crypt yourpass -S 52450745

the salt you need is right after the $6$saltvalue$*** (salt taken from your screenshot)