Distributed Computing for cracking a long passwd
#12
(07-12-2012, 10:32 AM)ntk Wrote: My is not an answer, but I do not intend to steal this thread.

I am following this thread with interest and like to understand too.

You three Atom, epixoip and undeath are experts and but with short, compact explanation you made us very confused. Could you please please please give us a command line as example
- how one machine can tackle this problem either GPU or CPU, even with GPU performance loss, -hence the need of 4 CPUs-
- What this member needs to do so 4 machines can tackle together this problem.

thank you very much for your help.

I'm not sure I understand the question properly but here is an example how to split a brute force up between 4 computers.

This is how to do it for WPA.

To make it easier to explain this is supposing you want to brute force numbers only against WPA at length 8. Also this is for windows 32bit. So you need to check what you are running.

It's unfortunate that 10 isn't easily divided by 4 ! Smile

oclHashcat-plus32.exe -a 3 --hash-type 2500 -1 ?d -2 01 test.hccap -o Found.txt ?2?1?1?1?1?1?1?1
oclHashcat-plus32.exe -a 3 --hash-type 2500 -1 ?d -2 234 test.hccap -o Found.txt ?2?1?1?1?1?1?1?1
oclHashcat-plus32.exe -a 3 --hash-type 2500 -1 ?d -2 567 test.hccap -o Found.txt ?2?1?1?1?1?1?1?1
oclHashcat-plus32.exe -a 3 --hash-type 2500 -1 ?d -2 89 test.hccap -o Found.txt ?2?1?1?1?1?1?1?1

I think that's right, someone will probably point out if it isn't ! Smile


Messages In This Thread
RE: Distributed Computing for cracking a long passwd - by Hash-IT - 07-12-2012, 07:56 PM