mode 10500 dictionary attack fails
#7
(01-24-2022, 03:59 PM)Snoopy Wrote: ? well no see attached picture, known hashes are skipped, unknown ( i added some gargabe hash ) are tried and the attack with dict exhaustes because there are no more passes to test

Exhausted just means that all passwords (or masks) given where tested, nothing more, and if the hahs/password is already in potfile it is skipped, the attack exhaustes everytime when hashcat finishes his run

Here's what I get when a potfile with a cracked hash is present:

OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics 620, 1568/3216 MB (804 MB allocatable), 24MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 32

INFO: All hashes found in potfile! Use --show to display them.

Started: Mon Jan 24 19:31:38 2022
Stopped: Mon Jan 24 19:31:39 2022

In any case, I'm referring to a problem that occurs with dictionaries longer than 20-25 words, in mode 10500 only:
Hashcat doesn't find the password although it's in the dictionary. Reproduced on two different Windows 10 machines, with both v6.2.4 and v6.2.5
Reply


Messages In This Thread
mode 10500 dictionary attack fails - by victorPV - 01-22-2022, 01:57 AM
RE: mode 10500 dictionary attack fails - by victorPV - 01-24-2022, 07:52 PM