7-zip 11600 Cracking - Benchmark around 600 kH/s, real world around 28 kH/s (7z 7zip)
#2
I don't see a way to edit so here are my commands. I can go off The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) if needed.

---------------------------------------------------
* Hash-Mode 11400 (SIP digest authentication (MD5))
---------------------------------------------------

Speed.#01........:  5116.5 MH/s (93.68ms) @ Accel:20 Loops:1024 Thr:512 Vec:1

-------------------------
* Hash-Mode 11500 (CRC32)
-------------------------

Speed.#01........:  9249.2 MH/s (54.21ms) @ Accel:42 Loops:1024 Thr:256 Vec:1

---------------------------------------------
* Hash-Mode 11600 (7-Zip) [Iterations: 16384]
---------------------------------------------

Speed.#01........:  646.9 kH/s (88.11ms) @ Accel:10 Loops:4096 Thr:512 Vec:1

--------------------------------------------------------------------
* Hash-Mode 11700 (GOST R 34.11-2012 (Streebog) 256-bit, big-endian)
--------------------------------------------------------------------

Speed.#01........:  107.6 MH/s (83.57ms) @ Accel:3 Loops:128 Thr:512 Vec:1

hashcat -m 11600 dcim.johnhash --session dcim_brute5 -O -a 3 -1 upper_lower_nums_and_not_all_symbols.hcchr -2 lower_nums_and_not_all_symbols.hcchr -3 ?l?d --increment --increment-min 5 ?3?3?3?3?3?3?3?3?3?3 -w 3 -S

└─$ hashcat -m 11600 dcim.johnhash --session dcim_2 -O -a 0 -w 3  /run/media/asdf/sam-1024-nvme/asdf/6ch.txt
hashcat (v7.1.2) starting - session [dcim_2]

This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.

CUDA API (CUDA 12.4)
====================
* Device #01: NVIDIA GeForce RTX 3070, 7139/7961 MB, 46MCU

OpenCL API (OpenCL 3.0 CUDA 12.4.131) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #02: NVIDIA GeForce RTX 3070, skipped

This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 20
Minimum salt length supported by kernel: 0
Maximum salt length supported by kernel: 51

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Single-Hash
* Single-Salt

Watchdog: Temperature abort trigger set to 90c

Host memory allocated for this attack: 1035 MB (27556 MB free)

Dictionary cache hit:
* Filename..: /run/media/asdf/sam-1024-nvme/asdf/6ch.txt
* Passwords.: 2751200914
* Bytes.....: 24514649144
* Keyspace..: 2751200914

[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => s

Session..........: dcim_2
Status...........: Running
Hash.Mode........: 11600 (7-Zip)
Hash.Target......: $7z$1$[snip]...100000
Time.Started.....: Thu Jan 29 00:53:43 2026 (20 secs)
Time.Estimated...: Fri Jan 30 08:05:06 2026 (1 day, 7 hours)
Kernel.Feature...: Optimized Kernel (password length 0-20 bytes)
Guess.Base.......: File (/run/media/asdf/sam-1024-nvme/asdf/6ch.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#01........:    24502 H/s (74.97ms) @ Accel:10 Loops:4096 Thr:512 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 471040/2751200914 (0.02%)
Rejected.........: 0/471040 (0.00%)
Restore.Point....: 471040/2751200914 (0.02%)
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:20480-24576
Candidate.Engine.: Device Generator
Candidates.#01...: lbocl -> mdhyw
Hardware.Mon.#01.: Temp: 63c Fan: 62% Util: 88% Core:1905MHz Mem:6800MHz Bus:16

[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>
Reply


Messages In This Thread
RE: 7-zip 11600 Cracking - Benchmark around 600 kH/s, real world around 28 kH/s (7z 7zip) - by postwar - 01-29-2026, 08:01 AM