Distributed Computing for cracking a long passwd
#21
Ok...

So that will produce a number like x.xxx X 10^30, right?

So how am i going to split the workload?
#22
y u so funny.
#23
(07-09-2012, 09:48 AM)atom Wrote:
(07-09-2012, 04:44 AM)epixoip Wrote: oclhashcat cannot crack passwords > 16 chars.

True, but oclHashcat-lite and hashcat CPU can. The problem is that the first 4 chars can not be static or you will loose all the performance.

In hashcat CPU you can also use this format:

hashConfusedalt

where salt is the fixed string you know and then use an appropriate salted algorithm type (if it exists).

(07-25-2012, 07:56 PM)undeath Wrote: y u so funny.

I don't understand your sarcasm but that's ok...

I'm out... I have downloaded another app to do the distributed workload and it's already running...