My bugs for v0.09b41
#8
Quote:This is very confusing. The single mode require 1 or 2 parameters, but not 3? what are you trying to do?
What's the command line then? I state "single", tells what hash type I want with 0 and then what password to hash with "testpass". I then redirect everything to test.txt. I don't see what I could remove and still get what I want.
---------------------------------------------------------------
As for the 0.09b42, you asked to test it again on the AMD side. I ran it again on the CUDA side (GTX470) because now I have ALL algos except WPA. The original problems on the first post are still there but here's the list of the bug I have on the other algos. Anything not listed means that it worked perfectly.

- For -m 10 md5($pass.$salt), Bruteforce of length 2 is not working.
- For -m 30 md5(unicode($pass).$salt), Length 15 does not work on all modes and length 2 does not work on bruteforce.
- For -m 110 sha1($pass.$salt), Bruteforce of length 2 is not working.
- For -m 111 nsldaps, SSHA-1(Base64), Netscape LDAP SSHA, Dictionary attack works (-a 0) but all the other attack mode fails.
- For -m 112 Oracle 11g, Bruteforce of length 2 is not working. The rest is perfect.
- For -m 130 sha1(unicode($pass).$salt), attack mode 1 and 7 fails. Mode 0,3 and 6 works perfectly well.
- For -m 131 MSSQL(2000), something really wrong is happening. Only the password with length 4 was cracked normally with bruteforcing. The password of length 2 that was supposed to be cracked by bruteforcing was cracked by the following command line in mode 7:

cudahashcat-plus64.exe -a 7 -d 1 -m 131 -o found.txt hash.txt ?s?s dic1.txt

I have double-checked, there is no empty line in dic1.txt so I don't know how it got cracked.
- For -m 132 MSSQL(2005), attack mode 1 and 7 fails. Mode 0,3 and 6 works perfectly well.
- For -m 141 EPiServer 6.x, Nothing worked.
- For -m 1410 sha256($pass.$salt), bruteforce with length 2 did not work. Everything else works fine.
- For -m 1710 sha512($pass.$salt), dictionary worked for all length and bruteforce for length 8, 12 and 15. All the other test (mode + length) failed.
- For -m 1800 sha512crypt, SHA512(Unix), there is random problems. -a 1 for length 15 failed, -a 3 for length 4 failed, -a 6 for length 15 failed, -a 7 for length 4 and 8 failed. The rest worked.
- For -m 2100 DCC2, I have generated the length 15 hashes with PasswordsPro Hash generator and they were cracked in all mode... Dictionary mode for length 2 failed. Bruteforce for length 4 failed. All the rest worked.


Messages In This Thread
My bugs for v0.09b41 - by mastercracker - 08-04-2012, 06:39 AM
RE: My bugs for v0.09b41 - by mastercracker - 08-04-2012, 02:12 PM
RE: My bugs for v0.09b41 - by mastercracker - 08-04-2012, 11:53 PM
RE: My bugs for v0.09b41 - by atom - 08-05-2012, 08:41 AM
RE: My bugs for v0.09b41 - by mastercracker - 08-05-2012, 08:01 PM
RE: My bugs for v0.09b41 - by mastercracker - 08-07-2012, 04:48 AM
RE: My bugs for v0.09b41 - by atom - 08-09-2012, 11:09 AM
RE: My bugs for v0.09b41 - by mastercracker - 08-10-2012, 04:28 AM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 11:15 AM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 11:37 AM
RE: My bugs for v0.09b41 - by mastercracker - 08-11-2012, 03:54 AM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 12:24 PM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 12:24 PM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 12:25 PM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 12:42 PM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 01:50 PM
RE: My bugs for v0.09b41 - by atom - 08-10-2012, 01:51 PM
RE: My bugs for v0.09b41 - by mastercracker - 08-12-2012, 03:22 AM
RE: My bugs for v0.09b41 - by atom - 08-12-2012, 06:29 PM