Long base passwords
#1
Hello all,

I'm having some trouble cracking some passwords that have a long static base string followed by unknown characters. For instance a password scheme like:

ThisPartIsAlwaysTheSame
ThisPartIsAlwaysTheSame1
ThisPartIsAlwaysTheSame!
ThisPartIsAlwaysTheSame1234
ThisPartIsAlwaysTheSame123456
ThisPartIsAlwaysTheSame1@E$56
ThisPartIsAlwaysTheSameVanessa

I'm invoking as follows (this run's hash is ThisPartIsAlwaysTheSame1234):

C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 C88C5A5162DE00A89E78A6265C4C0AAB ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40
oclHashcat-lite v0.10 by atom starting...

Password lengths range: 23 - 40
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cayman, 2048MB, 880Mhz, 24MCU
Device #2: Cayman, 2048MB, 880Mhz, 24MCU


c88c5a5162de00a89e78a6265c4c0aab:ThisPartIsAlwaysTheSame1234

Status.......: Cracked
Hash.Target..: c88c5a5162de00a89e78a6265c4c0aab
Hash.Type....: NTLM
Time.Running.: 0 secs
Time.Left....: 0 secs
Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a
Plain.Text...: **isPartIsAlwaysTheSame4\\4
Plain.Length.: 27
Progress.....: 17694720/81450625 (21.72%)
Speed.GPU.#1.: 117.0M/s
Speed.GPU.#2.: 117.4M/s
Speed.GPU.#*.: 234.4M/s
HWMon.GPU.#1.: 0% Util, 69c Temp, 32% Fan
HWMon.GPU.#2.: 0% Util, 69c Temp, 32% Fan

Started: Sat Nov 03 16:39:51 2012
Stopped: Sat Nov 03 16:39:53 2012

This works great until I get over a password length of 27, at which point it seems to truncate what I've asked for.

Invoking with hash for ThisPartIsAlwaysTheSame123456:

C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 2056CE87BA07FD7F40A5A5C49A1A5873 ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40
oclHashcat-lite v0.10 by atom starting...

Password lengths range: 23 - 40
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cayman, 2048MB, 880Mhz, 24MCU
Device #2: Cayman, 2048MB, 880Mhz, 24MCU

[s]tatus [p]ause [r]esume [q]uit =>
Status.......: Exhausted
Hash.Target..: 2056ce87ba07fd7f40a5a5c49a1a5873
Hash.Type....: NTLM
Time.Running.: 0 secs
Time.Left....: 0 secs
Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a
Plain.Text...: **isPartIsAlwaysTheSame
Plain.Length.: 27
Progress.....: 81450625/81450625 (100.00%)
Speed.GPU.#1.: 117.7M/s
Speed.GPU.#2.: 118.8M/s
Speed.GPU.#*.: 236.5M/s
HWMon.GPU.#1.: 0% Util, 70c Temp, 32% Fan
HWMon.GPU.#2.: 0% Util, 70c Temp, 32% Fan

Started: Sat Nov 03 16:43:16 2012
Stopped: Sat Nov 03 16:43:18 2012

It gives up at ThisPartIsAlwaysTheSame?a?a?a?a without processing the full mask specified.

Do I need a specific switch to get it to go beyond a length of 27, or is there a bug here?


Messages In This Thread
Long base passwords - by pragmatic - 11-04-2012, 01:53 AM
RE: Long base passwords - by epixoip - 11-04-2012, 03:33 AM
RE: Long base passwords - by pragmatic - 11-04-2012, 08:19 AM
RE: Long base passwords - by epixoip - 11-04-2012, 01:58 PM
RE: Long base passwords - by atom - 11-05-2012, 11:45 AM
RE: Long base passwords - by pragmatic - 11-05-2012, 01:15 PM
RE: Long base passwords - by atom - 11-05-2012, 02:27 PM
RE: Long base passwords - by pragmatic - 11-21-2012, 06:50 PM
RE: Long base passwords - by atom - 11-22-2012, 10:44 AM