Not enough allocatable device memory for this attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Not enough allocatable device memory for this attack (/thread-10791.html) |
Not enough allocatable device memory for this attack - Clay - 05-26-2022 Hi, I just wanted to decode the one password, just comparing one decoded password with password to crack (not the brutal force), and I get the below output (attachments) What can I do? Its just one easy comparing, the files are almost empty as I said, just one string in hashes.txt and passwordtocrack.txt as well. Process takes a long time and never ends. Thanks RE: Not enough allocatable device memory for this attack - Snoopy - 05-27-2022 (05-26-2022, 12:24 PM)Clay Wrote: Hi, your commandline is wrong, please remove the spaces between -O and the -o, also remove the -o try Code: hashcat -a0 -m1800 -O hashes.txt passwordtocrack.txt (if you look closely, hashcat things you want to supply the passwords by stdin/pipe mode) next thing, if you are on linux anyway, try this Code: mkpasswd -m sha512crypt 1234 Code: $6$cfgd3GmvI9XaIXQq$Bd0UUdPiNU4Hy0vw7Yqnsy6m0zyp4ZkHMsOX1Zkd5MLKDV5VqMs/aeTdLS2f/MSiz7Tv5JoVKTqlsf2kWTWPb0 so just Code: mkpasswd -m sha512crypt yourpass -S 52450745 the salt you need is right after the $6$saltvalue$*** (salt taken from your screenshot) |