hashcat Forum
DES performance possible with identical crypts? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: DES performance possible with identical crypts? (/thread-11537.html)



DES performance possible with identical crypts? - strcmp - 08-05-2023

Hello.

I would like to crack two DES (-m 14000) token.
crypt and plain are 8 bytes each.

hashes.txt:

Code:
crypt : plain1
crypt : plain2

Note that both pairs use the same crypt, which is unusual. Normally it is the other way around.

My hardware is NVIDIA RTX 2080 SUPER.

I use hashcat with the following arguments:

Code:
hashcat -m 14000 hashes.txt -o cracked.txt -a 3 -1 charsets/DES_full.hcchr --hex-charset ?1?1?1?1?1?1?1?1 -w 4 --force

Are there any arguments which might further increase performance?

Many thanks,

Besides this, I would be interested to learn more about the optimizations used by hashcat.

Code:
Optimizers applied:
* Zero-Byte
* Not-Iterated
...

I'm not talking about this YouTube video of atom, where the sound is unfortunately pretty bad.
But something written and general, especially the bitslicing and bit-evaluating (after calculation) part.


RE: DES performance possible with identical crypts? - marc1n - 08-05-2023

Never ever use --force in commandline this generated only error...

Cracking performance lower than expected?

* Append -S to the commandline.
This has a drastic speed impact but can be better for specific attacks.
Typical scenarios are a small wordlist but a large ruleset.


how to crack 10 char passwords? - nnoisislach - 08-05-2023

hello, can someone tell me how to crack a wifi password like this:

EF3XN4J145
V82KF91HF3

10 characters full of random uppercase and numbers


thanks.


RE: how to crack 10 char passwords? - marc1n - 08-05-2023

(08-05-2023, 04:18 PM)nnoisislach Wrote: hello, can someone tell me how to crack a wifi password like this:

EF3XN4J145
V82KF91HF3

10 characters full of random uppercase and numbers


thanks.

Why is he writing in another thread instead of starting his own?

https://hashcat.net/wiki/doku.php?id=mask_attack


RE: DES performance possible with identical crypts? - strcmp - 08-06-2023

(08-05-2023, 12:42 PM)marc1n Wrote: Never ever use --force in commandline this generated only error...

Cracking performance lower than expected?

* Append -S to the commandline.
  This has a drastic speed impact but can be better for specific attacks.
  Typical scenarios are a small wordlist but a large ruleset.

- Omitting --force didn't change anything.
- adding -S reduced the performance to 5% of the previous one.