Posts: 3
Threads: 1
Joined: May 2022
05-13-2022, 02:19 AM
what is that ?? please help me
image_2022-05-13_021826417.png (Size: 83.52 KB / Downloads: 8)
code:
hashcat (v6.2.5) starting
OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=====================================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i5-6300U CPU @ 2.40GHz, 1837/3738 MB (512 MB allocatable), 1MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Posts: 64
Threads: 1
Joined: Mar 2017
Did you *read* the message?
(05-13-2022, 02:19 AM)MLB11 Wrote: what is that ?? please help me
code:
hashcat (v6.2.5) starting
OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=====================================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i5-6300U CPU @ 2.40GHz, 1837/3738 MB (512 MB allocatable), 1MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Posts: 3
Threads: 1
Joined: May 2022
what message i don't understand
Posts: 64
Threads: 1
Joined: Mar 2017
Code: ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
(05-13-2022, 08:35 PM)MLB11 Wrote: what message i don't understand
Posts: 3
Threads: 1
Joined: May 2022
yes, i don't understand the error
Posts: 64
Threads: 1
Joined: Mar 2017
Ok, well it's not an error, it's telling you that you're using a "pure" kernel to crack your hash. There are good reasons to use a pure kernel, but it's going to be slower than using an "optimized" kernel. The message then says if you want to use an optimized kernel, you can add "-O" to your command line.
Good luck.
(05-14-2022, 12:23 AM)MLB11 Wrote: yes, i don't understand the error
Posts: 1
Threads: 0
Joined: Apr 2023
(05-13-2022, 02:19 AM)MLB11 Wrote: what is that ?? please help me
code:
hashcat (v6.2.5) starting
OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=====================================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i5-6300U CPU @ 2.40GHz, 1837/3738 MB (512 MB allocatable), 1MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
How were you able to get so many optimizers, and what do they do? I'm new to this and just started yesterday because I forgot the password of a .7z file lol
Posts: 374
Threads: 0
Joined: Nov 2017
04-01-2023, 07:44 PM
(This post was last modified: 04-01-2023, 07:44 PM by slyexe.)
Quote:How were you able to get so many optimizers, and what do they do? I'm new to this and just started yesterday because I forgot the password of a .7z file lol
Optimizers will automatically be applied when using the -O parameter. Based on your hash and what details are within your hash it will eliminate/add optimizers to increase the hashrate but also has fallbacks such as password length. This is all done automatically by hashcat and you do not have to apply each one separately.
Posts: 2
Threads: 0
Joined: Dec 2023
(05-13-2022, 02:19 AM)MLB11 Wrote: what is that ?? please help me
code:
hashcat (v6.2.5) starting
OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=====================================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i5-6300U CPU @ 2.40GHz, 1837/3738 MB (512 MB allocatable), 1MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Posts: 2
Threads: 0
Joined: Dec 2023
Use the Command : sudo hashcat -O -m 1000 <hashfile> <password file >
just add "-O" to resolve the error
|