| attacks using hashcat-utils
#4
Please keep in mind, that while for you this 2 things seem to end up doing the same or at least have several points in common, ... the feature to natively support combinations + rules is very different from using a pipe (stdin mode). I mean, within stdin mode you could "send" very different inputs (password candidates) to oclHashcat (not generated by combinator.bin or that like)...

Therefore, in theory we need to consider to open at least 2 different trac tickets:
- stdin mode: show more info, show status screen with all the information you have (and yes, we know oclHashcat does not have the info about the upper bound - when it should stop)
- -a1 should work together w/ -r

Before you open any ticket it would be good to check if there was no such (forum/trac) suggestion/discussion/track ticket before ... and if there real was, should devs consider it again etc. I didn't check it myself

UPDATE: <removed> - added in new post below


Messages In This Thread
RE: | attacks using hashcat-utils - by philsmd - 12-05-2013, 03:49 PM
RE: | attacks using hashcat-utils - by philsmd - 12-05-2013, 04:31 PM
RE: | attacks using hashcat-utils - by philsmd - 12-05-2013, 04:56 PM