[split] Another Ethereum Password Crack
#1
Hi,
I have a question similiar to the above
running a 4028GR-TR2 server with a few Tesla V100's

Getting around 3000 H on 15700. Can not get CPU cores to work along with the Tesla's.
here is what I get

NvAPI_EnumPhysicalGPUs(): NVAPI_NVIDIA_DEVICE_NOT_FOUND
nvmlDeviceGetFanSpeed(): Not Supported
nvmlDeviceGetFanSpeed(): Not Supported

CUDA API (CUDA 11.2)
====================
* Device #1: Tesla V100-PCIE-16GB, 15951/16258 MB, 80MCU
* Device #2: Tesla V100-PCIE-16GB, 15951/16258 MB, 80MCU

OpenCL API (OpenCL 1.2 CUDA 11.2.109) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #3: Tesla V100-PCIE-16GB, skipped
* Device #4: Tesla V100-PCIE-16GB, skipped

OpenCL API (OpenCL 2.1 WINDOWS) - Platform #2 [Intel(R) Corporation]
====================================================================
* Device #5: Intel(R) Xeon(R) CPU E5-2670 v3 @ 2.30GHz, skipped

this is my setting on hashcat using Hashbull.

hashcat.exe -a 0 -m 15700 -w 3 --session=2021-01-27 --encoding-from=utf-8 --encoding-to=ISO-8859-1 --potfile-disable --hwmon-temp-abort=85 -O -o C:\Hashbull\#_Crackout\Crack_20210128_071957_Mode_15700.txt -r C:\Hashbull\Rules\Eth1500FrontRule.rule -r C:\Hashbull\Rules\passphrase-rule1.rule C:\Hashbull\hashcode.txt C:\Hashbull\#_Wordlists\passphrases.txt

I made up a front rule for the 6 Characters known and want to brute force the 2nd 6 characters that are unknown.
Can someone simplify this so it works, I tried a bunch of ways but something is not right.
I rather just use hashcat straight.
Sorry in advance for long post
Reply


Messages In This Thread
[split] Another Ethereum Password Crack - by daveinli1218 - 02-04-2021, 12:54 AM
RE: Another Ethereum Password Crack - by vicious1 - 02-04-2021, 05:35 PM