Before the password cracking operation
#1
Hello

We tried to use hashcat to see how password cracking actually works.

In fact, the internal operation value was output through the printf() function statement in the m01400_sxx function part of the m01400_a3-pure.cl file. In particular, the word value and password length were output, but a questionable result was obtained.

We put a hash value of one alphabet (lowercase/uppercase/numeric) as input, and we expected that an operation process with pw_len of 1 would come out in the course of operation.

However, before the password cracking process, password cracking is performed after calculating not only the words corresponding to 0x5c5c5c5c and 0x36363636 but also the case where pw_len is 7.

I wonder if this process includes other dummy operations as a part to accelerate GPU operations, or is it an operation that must be included in Hashcat?

Thank.
Reply
#2
well hashcat basically just works like this (or i dont get the question)

searched_hash = HASH-ABCDEF
hashfunction()
output = hashfunction(input)

if output equals searched_hash, then input = searched pw for searched hash of a particular hashfunction
Reply
#3
This is the autotune default values. You want to read plugin developer guide to understand what you need to do proper printf() debugging.
Reply
#4
(06-17-2021, 05:00 PM)Snoopy Wrote: well hashcat basically just works like this (or i dont get the question)

searched_hash = HASH-ABCDEF
hashfunction()
output = hashfunction(input)

if output equals searched_hash, then input = searched pw for searched hash of a particular hashfunction

thank you for your answer.
Your answer has been very helpful.
Thank you.
Reply
#5
(06-17-2021, 11:23 PM)atom Wrote: This is the autotune default values. You want to read plugin developer guide to understand what you need to do proper printf() debugging.

thank you for your answer.
Your answer has been very helpful.
Thank you.
Reply