![]() |
oclHashcat v2.10 performance questions? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: oclHashcat v2.10 performance questions? (/thread-5415.html) |
oclHashcat v2.10 performance questions? - halexan - 04-27-2016 Version of oclHashcat is "v2.10 beta 192" When cracking -m=5500 NetNTLMv1. The following results are extremely different! Running benchmark, speed is 1218.2 MH/s. Code: ./oclHashcat64.bin -m 5500 -b --opencl-device-types 1 Using wordlist, speed is 4558.7 kH/s!!! Its too slow! Code: ./oclHashcat64.bin -m 5500 /home/pptp.txt /home/dict_20160122.txt --opencl-device-types 1 I remember that hashcat v2.00's speeds of Straight and Brute-force mode do not have such difference, for example, benchmark speed is 190Mh/s and Straight mode is 80Mh/s. Why the speeds are so different on oclHashcat v2.10? RE: oclHashcat v2.10 performance questions? - atom - 04-27-2016 Your doing 2 things wrong! Read this: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#why_is_my_attack_so_slow Point 2 and 3 Basically 1) add a rule (important!) and 2) add -w 3 RE: oclHashcat v2.10 performance questions? - halexan - 04-27-2016 (04-27-2016, 10:43 AM)atom Wrote: Your doing 2 things wrong! I tried "add a rule" and "add -w 3", and the speed rises to 105.6 MH/s. However, I don't want to create more work for full speed, I just want to try every password in my wordlist faster. Is 4558.7 kH/s the highest speed that transmit passwords in wordlist from memory to the compute kernels (CPU)? RE: oclHashcat v2.10 performance questions? - atom - 04-27-2016 Not sure what your problem is, 105MH/s is pretty good for a CPU. RE: oclHashcat v2.10 performance questions? - halexan - 04-27-2016 (04-27-2016, 11:32 AM)atom Wrote: Not sure what your problem is, 105MH/s is pretty good for a CPU. I just want to know why "v2.10" using word list in straight mode leads to a big speed drop, as I mentioned above, 1200Mh/s downto 4500kh/s. While hashcat v2.00 does not have this serious problem (not too much drops). Does the reading speed of wordlist affect the crack speed? I mean, when cracking a password, you should take out a password in the wordlist, and caculate whether it is right, if it is not right, you should take out the next password in the wordlist. Does the speed of taking out passwords affect the crack speed? If read password faster, the crack speed will be faster? RE: oclHashcat v2.10 performance questions? - atom - 04-28-2016 I think you're confusing hashcat and oclHashcat here, is that possible? RE: oclHashcat v2.10 performance questions? - undeath - 04-29-2016 Looks like something is off to me. Check the outputs in the first post, atom. RE: oclHashcat v2.10 performance questions? - atom - 04-29-2016 Don't see anything RE: oclHashcat v2.10 performance questions? - halexan - 05-03-2016 I still don't understand. Why there is a big performance difference between brute-force and straight mode? brute-force 1200Mh/s, using wordlist 4500kh/s Is there any method to narrow the gap? RE: oclHashcat v2.10 performance questions? - undeath - 05-03-2016 (05-03-2016, 05:49 AM)halexan Wrote: Is there any method to narrow the gap? (04-27-2016, 10:43 AM)atom Wrote: Basically 1) add a rule (important!) and 2) add -w 3note: preferably a rule file with more than one rule |