Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: strange Electrum Wallet performance on different GPUs
Post: RE: strange Electrum Wallet performance on differe...
after searching for a few days,i think i find something.
Maxwell and Pascal GPUs use a different implementation with separate shared memory but combined L1 cache and texture cache.
Turing’s SM i... |
|
hash_cat_fish |
hashcat
|
1 |
4,887 |
08-04-2021, 07:54 PM |
|
|
Thread: strange Electrum Wallet performance on different GPUs
Post: strange Electrum Wallet performance on different G...
2070s has the same speed as 1080ti on md5 , but on mode 21700 , 2070s is more than twice as fast as 1080ti
tesla-t4 is much slower than 1080ti on md5 , but on mode 21700,tesla-t4 is much more faster t... |
|
hash_cat_fish |
hashcat
|
1 |
4,887 |
08-03-2021, 08:58 AM |
|
|
Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3
Skwerl23 Wrote: (02-24-2018, 10:55 PM)
--
if your keyspace is small or dictionary is small, then it doesn't really matter if you put it in a dictionary or use a piped option.
i've been struggling wi... |
|
hash_cat_fish |
hashcat
|
6 |
23,739 |
02-26-2018, 04:20 AM |
|
|
Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3
philsmd Wrote: (02-15-2018, 10:30 AM)
--
If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password cand... |
|
hash_cat_fish |
hashcat
|
6 |
23,739 |
02-24-2018, 06:51 AM |
|
|
Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3
atom Wrote: (02-13-2018, 10:39 AM)
--
You can run two instances of hashcat and pipe the output of the first as input to the second while using the prepend rules on the first and the append rules on t... |
|
hash_cat_fish |
hashcat
|
6 |
23,739 |
02-15-2018, 10:19 AM |
|
|
Thread: rules file support in attack mode 3
Post: rules file support in attack mode 3
I can use command like this to bruteforce hash
Code:
--
hashcat64.exe -a 3 -m 0 ed2b1f468c5f915f3f1cf75d7068xxxx ?d?d?d?d?d?d?d?d
--
But how can I let the hashcat know that the first four ?d?d?... |
|
hash_cat_fish |
hashcat
|
6 |
23,739 |
02-12-2018, 09:19 AM |