Distributed Computing for cracking a long passwd
#10
(07-09-2012, 09:48 AM)atom Wrote:
(07-09-2012, 04:44 AM)epixoip Wrote: oclhashcat cannot crack passwords > 16 chars.

True, but oclHashcat-lite and hashcat CPU can. The problem is that the first 4 chars can not be static or you will loose all the performance.

In hashcat CPU you can also use this format:

hash:salt

where salt is the fixed string you know and then use an appropriate salted algorithm type (if it exists).

[/quote]
undeath Wrote:
oclhashcat-* won't crack anything with more than 15 chars.

(07-09-2012 03:44 AM)epixoip Wrote:
oclhashcat cannot crack passwords > 16 chars.

are you that ignorant?
[/quote]

My is not an answer, but I do not intend to steal this thread.

I am following this thread with interest and like to understand too.

You three Atom, epixoip and undeath are experts and but with short, compact explanation you made us very confused. Could you please please please give us a command line as example
- how one machine can tackle this problem either GPU or CPU, even with GPU performance loss, -hence the need of 4 CPUs-
- What this member needs to do so 4 machines can tackle together this problem.

thank you very much for your help.


Messages In This Thread
RE: Distributed Computing for cracking a long passwd - by ntk - 07-12-2012, 10:32 AM