06-16-2021, 11:23 AM
Hello
We tried to use hashcat to see how password cracking actually works.
In fact, the internal operation value was output through the printf() function statement in the m01400_sxx function part of the m01400_a3-pure.cl file. In particular, the word value and password length were output, but a questionable result was obtained.
We put a hash value of one alphabet (lowercase/uppercase/numeric) as input, and we expected that an operation process with pw_len of 1 would come out in the course of operation.
However, before the password cracking process, password cracking is performed after calculating not only the words corresponding to 0x5c5c5c5c and 0x36363636 but also the case where pw_len is 7.
I wonder if this process includes other dummy operations as a part to accelerate GPU operations, or is it an operation that must be included in Hashcat?
Thank.
We tried to use hashcat to see how password cracking actually works.
In fact, the internal operation value was output through the printf() function statement in the m01400_sxx function part of the m01400_a3-pure.cl file. In particular, the word value and password length were output, but a questionable result was obtained.
We put a hash value of one alphabet (lowercase/uppercase/numeric) as input, and we expected that an operation process with pw_len of 1 would come out in the course of operation.
However, before the password cracking process, password cracking is performed after calculating not only the words corresponding to 0x5c5c5c5c and 0x36363636 but also the case where pw_len is 7.
I wonder if this process includes other dummy operations as a part to accelerate GPU operations, or is it an operation that must be included in Hashcat?
Thank.