oclHashcat exhausted immediatly when using long mask on WPA brute-force attack
#3
I have to add that I have 4GB or RAM.

My assumption is that, when using a mask, oclHashcat somehow tries to "reserve" the memory space for the entire possible dictionary for that mask.

8 charcaters -> 2GB
16 charcaters -> 4GB
32 characters -> 8GB

so with my setup it's only fine until 15 characters.

I don't find a reason why oclHashcat would work this way but that's the best reason I can find so far. Moreover it would be a big coincidence that I'm fine till 15 characters, which matches the 'old' limit of oclHashcat (previous -plus v0.15).

Unfortunately I don't have an extra DDR3 module to try.


Messages In This Thread
RE: oclHashcat exhausted immediatly when using long mask on WPA brute-force attack - by 0xd - 11-26-2014, 10:16 AM