[fingerprint] combinator attack v0.13 bad, v0.15 good FYI upgrade! - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: [fingerprint] combinator attack v0.13 bad, v0.15 good FYI upgrade! (/thread-2556.html) |
[fingerprint] combinator attack v0.13 bad, v0.15 good FYI upgrade! - hashfixer - 08-28-2013 using hc-plus 013 I get this for a straight wordlist attack: Code: Session.Name...: oclHashcat-plus however.. I took 1000 cracked passwords, and ran it though expander, removed dupes etc and ended up with near 10,000 in the new wordlist. Besides that, it seems to be running overly slow . Code: Session.Name...: oclHashcat-plus all of this was with version 0.13, so I upgraded to 0.15 Same exact command, wordlists etc except i used v0.15, and results are... Code: Session.Name...: oclHashcat-plus All attacks are on oldvbull hashes (2611). Here are my commands for starting hc. Code: rem FYI - I rename the exe I want to use to hashcat.exe, I'm using the 64-bit opencl for a single AMD 6950 card Another FYI, with md5 (hashtype 0), there are no problems that I could see. RE: [fingerprint] combinator attack v0.13 bad, v0.15 good FYI upgrade! - Mangix - 08-28-2013 you might wish to sort your wordlists by length as suggested by atom in the release notes for 0.15. Actually this is a good idea for any version of oclhashcat. You can use the splitlen utility to do so as well as a bash script like so... awk '{print length, $0}' < wordlist.dict | sort -n | cut -d ' ' -f 2- > wordlist2.dict && rm wordlist.dict && mv wordlist2.dict wordlist.dict The main difference is that splitlen generates 15 files and my solution resorts your dictionary. RE: [fingerprint] combinator attack v0.13 bad, v0.15 good FYI upgrade! - hashfixer - 08-28-2013 Thanks for the command line, I have been planning to do that actually, just never gotten around to getting it done . I only found the finger print method around 12 hours ago, and my md5 collection of hashes went from ~90% to 93%, after upgrading to oclhashcat 0.15 (for length limits removed etc), I'm so close to 95%, around 94.8%. Before today, I thought that was nearly impossible on my hardware, glad to be wrong . RE: [fingerprint] combinator attack v0.13 bad, v0.15 good FYI upgrade! - atom - 08-28-2013 Quote:One last note about performance. There was a change to the status-display of the speed value which does not affect the real performance. With new oclHashcat-plus v0.15 the speed that is shown gets divided by the number of uncracked unique salts. Older oclHashcat-plus versions did not take this into account. Don't get shocked when you're cracking a large salted hashlist and the speed dropped by hundret of times (or to be exact by number of hashes/salts), the total time will stay equal. |