stdin mode, length limit, a lot gets rejected - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: stdin mode, length limit, a lot gets rejected (/thread-4705.html) |
stdin mode, length limit, a lot gets rejected - root2 - 09-28-2015 Hi, I use a CĀ program that build password guesses based on the following rule: Code: email:pw:username:SOME_VERY_LONG_CONSTANT In the moment I pipe those generated password candidates to oclHashCat in stdin mode, most of them will be rejected because the candidates are too long. Code: cat dictionary.dict | ./myCprogram | ./oclHashCat64.bin somehashes.md5 What can I do about it? RE: stdin mode, length limit, a lot gets rejected - epixoip - 09-28-2015 1. There's nothing you can do about it, the length is simply too long for any optimized cracker. You'll need to use a cracker that just uses OpenSSL or something. 2. oclHashcat is not the correct program to use for this anyway. Since you have no amplifier, you are gaining no acceleration. This attack will be faster on CPU than GPU regardless. RE: stdin mode, length limit, a lot gets rejected - root2 - 09-28-2015 Thanks for the info. This can be closed. |