Distributed Computing for cracking a long passwd
#6
(07-09-2012, 09:48 AM)atom Wrote:
(07-09-2012, 04:44 AM)epixoip Wrote: oclhashcat cannot crack passwords > 16 chars.

True, but oclHashcat-lite and hashcat CPU can. The problem is that the first 4 chars can not be static or you will loose all the performance.

In hashcat CPU you can also use this format:

hashConfusedalt

where salt is the fixed string you know and then use an appropriate salted algorithm type (if it exists).

I'm using my video card to do the job. It's speed is at 114.1M/s. I don't know if it's fast or slow but the ETA is 6 days and 8 hours...

Can you explain better the part of the 4 fixed digits and the part of the format hashConfusedalt?


Messages In This Thread
RE: Distributed Computing for cracking a long passwd - by HelloShitty - 07-09-2012, 08:33 PM