Possible OCLhashcat+ bug
#7
Just in case Atom missed it, the problem is existant. From what I noticed, it seems to crack a password but sometime then assign it to the wrong hash. For all the wrong HashTongueassword pair, the password is present elsewhere with the correct hash. Sometimes the "wrong hash" is also there with it's correct password. Since I was using the --remove, it means that it is an output problem since the "wrong" hash was still available for cracking after. Again, I will repeat the conditions, large amount of hashes > 3 millions, multiple rules and multi-GPU. I don't know if anyone can replicate the behavior (does anyone else double-check the hash:pass that OCLhashcat spits out?).


Messages In This Thread
Possible OCLhashcat+ bug - by mastercracker - 02-11-2011, 05:28 PM
RE: Possible OCLhashcat+ bug - by atom - 02-11-2011, 05:50 PM
RE: Possible OCLhashcat+ bug - by atom - 02-15-2011, 03:58 PM
RE: Possible OCLhashcat+ bug - by mastercracker - 02-16-2011, 03:28 AM
RE: Possible OCLhashcat+ bug - by atom - 02-16-2011, 10:17 AM
RE: Possible OCLhashcat+ bug - by mastercracker - 02-17-2011, 06:07 AM
RE: Possible OCLhashcat+ bug - by mastercracker - 02-23-2011, 07:02 PM
RE: Possible OCLhashcat+ bug - by mastercracker - 02-26-2011, 05:59 AM
RE: Possible OCLhashcat+ bug - by atom - 02-26-2011, 09:36 AM
RE: Possible OCLhashcat+ bug - by mastercracker - 02-27-2011, 03:59 AM