aes128 brute-force w/mask using half sha256
#4
(01-09-2018, 02:42 PM)philsmd Wrote: Long constant strings within the mask (especially at the beginning of the mask) are always bad for the performance.

You could try to use different attack modes, like -a 6:
Code:
hashcat -m 1400 -a 6 -w 3 -O --hex-charset hash.txt dict.txt "?b?b?b?b?b?b7c31"

where dict.txt contains this (the prefix):
$HEX[3cb8230a00000000]
That method actually reduced speed to about 2 Kh/s. I'm getting about 35 Mh/s with my best PC with the command I posted above, which I can live with.

It was worth a try, thanks.
(01-09-2018, 03:22 PM)DanielG Wrote: If you only have half a SHA256 hash I think you would need to edit the m01400* files (SHA256) to do something similar as the m05100* files (Half MD5) on https://github.com/hashcat/hashcat/tree/master/OpenCL.
I looked in that area and couldn't see anything resembling a hash/sha256digest comparison.
Guess I'll have to keep looking. I have a feeling the comparison might not even be in the OpenCL code.


Messages In This Thread
RE: aes128 brute-force w/mask using half sha256 - by hashkitten - 01-10-2018, 08:00 AM