![]() |
oclhashcat SE - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Feature Requests (https://hashcat.net/forum/forum-7.html) +--- Thread: oclhashcat SE (/thread-90.html) |
oclhashcat SE - proinside - 07-15-2010 With some doubts that this will be seen as an interesting feature/request, a Special Edition of oclhashcat, that would be build to work only a single hash, instead of multiple hashes, would return/give a very high speed calculation for for larger passwords (9-11 characters long). Would be useful for brute force. I guess. Just an idea of course. RE: oclhashcat SE - atom - 07-16-2010 oclHashcat already uses single hash optimizations, you can see it especially on cards which support bitalign. if you are refering on MD5 reversing techniques (+25 %) i will not add them. that does not fit into oclHashcat structure which is designed to do hybrid attack, not brute-force. thx for the suggestion and pls continue to do so. RE: oclhashcat SE - atom - 11-19-2011 done. latest oclHashcat-lite supports this. thread closed. |