low performance with prepend more than 3 characters in mask attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: low performance with prepend more than 3 characters in mask attack (/thread-4660.html) |
low performance with prepend more than 3 characters in mask attack - shadowmourne - 09-06-2015 when i run Code: cudaHashcat64.bin -a 3 -m 5100 b068322473d98c88 123?a?a?a?a?a?a1111111111155e82da34 Code: Session.Name...: cudaHashcat but if i run Code: cudaHashcat64.bin -a 3 -m 5100 b068322473d98c88 1234?a?a?a?a?a?a1111111111155e82da3 Code: Session.Name...: cudaHashcat is this a bug or something? RE: low performance with prepend more than 3 characters in mask attack - rico - 09-06-2015 I was wondering about this myself. I was playing with NTLM (-m 1000) a couple of nights ago and noticed that prepending even a single character slows the hash rate to ~25% whilst append works the same, e.g. Straight mask = 13,500 MH/s: Quote:oclHashcat64 -m 1000 -a 3 hash.txt ?l?l?l?l?l?d?d?d?d?d?d?d Prepend a character (replace first ?l) = 3,400 MH/s: Quote:oclHashcat64 -m 1000 -a 3 hash.txt n?l?l?l?l?d?d?d?d?d?d?d Append append a digit (replace last ?d) = 13,586 MH/s: Quote:oclhashcat64 -m 1000 -a 3 hash.txt ?l?l?l?l?l?d?d?d?d?d?d7 For reference, this same card benches at 16877.9 MH/s. Yes, I know about tweaking -n and -u but the issue remains either way. EDIT: cudaHashcat64 does the same thing on a GTX 760 (3607.4 MH/s vs 1020.4 MH/s = ~28% performance). RE: low performance with prepend more than 3 characters in mask attack - FlippingGerman - 09-07-2015 The rule engine was designed for CPU and is (apparently) not nearly so good on GPU. As for a brute-force, I have the same problem, GPU benches at ~ 1400 MH/s MD5 but only does less than half that in practice. I thought about it for a while; I think it's because benchmark is single-hash and most things you'll have done there are likely not. Especially if they're password dumps, they can be thousands or millions. RE: low performance with prepend more than 3 characters in mask attack - epixoip - 09-07-2015 Benchmark mode performs a single hash brute force of a large keyspace, an ideal scenario that presents the opportunity for maximum optimization. Many of the optimizations are not applicable when attacking multiple hashes or using other attack modes. The reason why replacing ?l with the single character "n" results in dramatically lower speed is that the left side of the mask is now too small to gain full acceleration. RE: low performance with prepend more than 3 characters in mask attack - shadowmourne - 09-07-2015 (09-07-2015, 04:25 AM)epixoip Wrote: The reason why replacing ?l with the single character "n" results in dramatically lower speed is that the left side of the mask is now too small to gain full acceleration. but add a character 'n' to the left of original mask also reduce the speed to nearly 28%. Quote:cudaHashcat64.bin -m 1000 -a 3 b4b9b02e6f09a9bd760f388b67351e2b ?l?l?l?l?l?d?d?d?d?d?d?d Quote:cudaHashcat64.bin -m 1000 -a 3 b4b9b02e6f09a9bd760f388b67351e2b n?l?l?l?l?l?d?d?d?d?d?d?d RE: low performance with prepend more than 3 characters in mask attack - epixoip - 09-07-2015 Of course, it has the exact same effect. |