hashcat Forum
Problem in restoring various session - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: Problem in restoring various session (/thread-4847.html)



Problem in restoring various session - n_lona - 11-25-2015

these following restore files are different session in cracking my router root account (damned isp). Is is simple to restore session made in different version by simply switching number version of oclhashcat binary. Is it true or false?
Code:
�/home/hpY
P�6./oclHashcat-1.37/oclHashcat64.bin
-m
1800
-a
3
-o
found
-i
--increment-min
7
--increment-max
18
--force
admin.hash
?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a
Code:
�/home/hpw
          ����./oclHashcat-1.36/oclHashcat64.bin
-m
1800
-a
3
-o
found
-i
--increment-min
7
--increment-max
18
--force
admin.hash
?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a


why these following session cannot be restored with the command oclHashcatx.bin --restore --session (session_name) ? eg.: ocdHashcat64.bin --restore --session 12char/8char/oclHashcat12char
Code:
�/home/hp
�r./oclHashcat-1.36/oclHashcat64.bin
-m
1800
-a
3
-o
found.txt
-i
--increment-min
12
--increment-max
18
--force
--session
12char
admin.hash
?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a
Code:
�/home/hpR
          �I?./oclHashcat-1.36/oclHashcat64.bin
-m
1800
-a
3
-o
found.txt
-i
--increment-min
8
--increment-max
18
--force
--session
8char
admin.hash
?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a
Code:
�/home/hp�
          �f./oclHashcat-1.37/oclHashcat64.bin
-m
1800
-a
3
-o
found.txt
-i
--increment-min
12
--increment-max
18
--force
--session
oclHashcat12char
admin.hash
?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a



RE: Problem in restoring various session - rico - 11-25-2015

Why bother? The 12% speed increase from v1.36 to v1.37 still isn't going to brute-force crack that password this decade...


RE: Problem in restoring various session - n_lona - 11-29-2015

(11-25-2015, 04:23 PM)rico Wrote: Why bother? The 12% speed increase from v1.36 to v1.37 still isn't going to brute-force crack that password this decade...
how could I translate crunch 4 16 -d 2@ -d 3@ 2, 2% 2^|pyrit --passthrough to oclhashcat

And is there a possibility to force restore point creation?