truncating passwords instead of rejecting them
#6
Hmm, still rejecting 60% of my passwords. I dug around a little more, and found this thread:

http://hashcat.net/forum/thread-3132.html

It turns out that on GPU, using -r to specify a separate truncating rule won't work. This was reported as a bug that has been flagged as a wontfix:

https://hashcat.net/trac/ticket/2

Quoting atom:

Quote:I see what you mean. The problem is that oclHashcat-plus applies the rules on GPU for fast hashes. DEScrypt is a fast hash. But on GPU, there is no way of rejecting a candidate.
What you can do, and I think its a fine solution, is that you use a rule like -j '8 (needs proper escaping on linux). This will truncate all words from your dictionary to length 8 before the are checked by the reject function.

Using -j '8 works for me - no more rejected passwords, so I think that I've found my answer. Thanks!
~


Messages In This Thread
RE: truncating passwords instead of rejecting them - by royce - 01-14-2015, 10:31 PM