Help splitting brute-force attack
#3
(05-14-2014, 08:46 PM)epixoip Wrote: This is covered in the release notes for 1.20. See the "Improved distributed cracking support" section of http://hashcat.net/forum/thread-3323.html

Thanks epixoip.
I've now understood how it works, my example:
Quote:Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --keyspace

?a?a?a?a?a?a?a?a - being the length and charset used (8 chars).

In my particular case, it gave me the number of keyspace as 7737809375

Then, I divided that number by how many individual machines to run the attack on, for example if it where 8 machines:
7737809375 / 8 = 967226171,875 = 967226172 (round number)

Then we create 8 specific commands, one for each machine, like so:
Quote:MACHINE 1:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=0 --limit=967226172 --session=my_session_file --restore

MACHINE 2:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=967226172 --limit=1934452344 --session=my_session_file --restore

MACHINE 3:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=1934452344 --limit=2901678516 --session=my_session_file --restore

MACHINE 4:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=2901678516 --limit=3868904688 --session=my_session_file --restore

MACHINE 5:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=3868904688 --limit=4836130860 --session=my_session_file --restore

MACHINE 6:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=4836130860 --limit=5803357032 --session=my_session_file --restore

MACHINE 7:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=5803357032 --limit=6770583204 --session=my_session_file --restore

MACHINE 8:
Hashcat -mNUM -aNUM --outfile=cracked_pwd.file --outfile-format=NUM hash_or_hashfile.hash ?a?a?a?a?a?a?a?a --skip=6770583204 --limit=7737809375 --session=my_session_file --restore

I think that's roughly it. Thanks for the help!


Messages In This Thread
Help splitting brute-force attack - by ner0 - 05-14-2014, 08:23 PM
RE: Help splitting brute-force attack - by ner0 - 05-14-2014, 09:51 PM