08-28-2014, 07:57 PM
(08-28-2014, 06:05 PM)atom Wrote: Because you lose the amplifier. That's very technical and goes back how oclhashcat partially reverses the MD5. The best workaround is to use it as a salted hash:
oclHashcat32.exe -m 20 -a 3 8fa1c84f6XXXX38ccXXXXf04274a0c52:keys ?a?a?a?a?a?a?a?a
That'a slower as it can not reverse anymore, but should be faster than 10220.0 kH/s
I was doing something like this today with NTLM I specified a few character of the known password and the rest was a mask and that resulted in significantly slower processing.
Is this due to something similar?
Code:
./hc -w 3 -a 3 -m 1000 ntlm.wrk M?s?l?l?l?s?d?d?d?d