08-31-2012, 05:16 AM
Finally, all tests are done!
Results: (If no note is given means all is working perfectly!)
I'm keeping this one-damn-fine version =D
System: Windows7 64-bit, nVidia, 304,79 beta, plus-0.09b58.
Thanks to atom's perl code and my MasterHasher.php.
Results: (If no note is given means all is working perfectly!)
Code:
-m0
-m10
-m20
-m30
-m40
-m100
-m110
-m120
-m130: Same problem as -m131, -m132.
-m140
-m300
-m400
-m500: All works EXCEPT it fails to crack any 1-character-long password on all attack modes (Only -a0 and -a3 can get that though).
-m900
-m1000
-m1100
-m1400
-m1410
-m1420
-m1500
-m1600: Same problem as -m500.
-m1700
-m1710: Interestingly, None of -a1, -a6 and -a7 work, on all lengths.
-m1720
-m1800
-m2100
-m2400
-m2500: SKiPPiNG.
-m2600
-m3000: Worked well, But this BUG (https://hashcat.net/forum/thread-1216.html) still exists. Funny it's giving me different results this time, but still wrong results!
-m3100: I'm not sure about this algo, when I use -a3, all is being cracked but if len(pass) > 8 : its truncating the passes to 8. Other attacks don't do that, they act just like a regular MD5.
-m3200
-m11
-m21
-m101
-m111
-m112
-m121
-m122
-m131: All good, except -a7 seems to have a problem.
-m132: Exact same problem of -m131. Only 1-character-long password is found when doing -a7, which should never happen with -a7 (it works with a mask!).
-m141
-m1722
-m2611
-m2711
-m2811: MyBB1.2+ uses ?l?u?d_len(8) salt, please add an exception.
System: Windows7 64-bit, nVidia, 304,79 beta, plus-0.09b58.
Thanks to atom's perl code and my MasterHasher.php.