hashcat Forum
hashcat and maskprocessor piping ? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html)
+--- Thread: hashcat and maskprocessor piping ? (/thread-975.html)



hashcat and maskprocessor piping ? - Richie - 03-07-2012

Hi there,

im Kinda new to password cracking but i´m trying to learn fast.
Currently i´m working on a distributing framework which should be available for many purposes. One of them should be password cracking.
I have around 60 similar machines for it - but they only have the Intel HD graphics build in and I have no chance to equip them with any.
So from what i understand i have to use hashcat and not the ocl-version.
I played around with maskprocessor to find out to brute-force speed but the drawback is that hashcat cant use a pipe to read directly from mp64. I found the "workaround" with the fifo but this reduces my cpu load to around 75% while hashcat (with -n 4 option) is using all cores at 100%. Since bruteforce takes a long time i need that 20-25% im loosing with the fifo - and therefore i´m asking here if there are any suggestions on speeding this up - or maybe and hashcat version which is capable of getting the wordlist piped in. (like mp64.bin <parameters> | hashcat-cli62.bin <parameters> hashfile [wordlist].

any ideas ?

regards, richie


RE: hashcat and maskprocessor piping ? - atom - 03-07-2012

there are plans to harmonize the brute-force syntax in all hashcat derivates. in other words, you will not need maskprocessor nor pipe anything into hashcat to run mask attacks with hashcat. i am still watching the demand but since you are writing a distributing framework this is a strong argument.

i will close this thread, please continue the discussion here: http://hashcat.net/forum/thread-865.html