01-19-2014, 02:51 AM
(01-19-2014, 02:46 AM)dglatting Wrote: Specifics on the underlying protocol and authentication mechanisms, please.
there is no protocol, nor authentication mechanisms. this is not a solution for distributed cracking. it just adds a few features to hashcat which make it easier to integrate into distributed frameworks.
(01-19-2014, 02:46 AM)dglatting Wrote: My use cases are probably different that others. In my case, I have precomputed password lists whereas others are probably running rules against small lists. In my case I have >50TB of data.
unless you are working with very slow algorithms, you cannot achieve full acceleration with wordlists, regardless of their size. rules are necessary when cracking fast hashes if you have any hopes of achieving full acceleration. otherwise you might as well just be using cpu.