11-09-2022, 12:14 PM
Hi, I'm using hashcat in command prompt as administrator in Windows 10.
When I enter the following line in version 6.2.6:
...it runs for a very short while and just stops at initiating self-test. Here's the command prompt:
When pressing a key, the menu appears but nothing happens no matter what I do.
To counter this I added the option, but this time it gets stuck at ! I've also tried the command in version 6.2.5, and the exact same thing happens.
Here's the command prompt for detail:
Any help would be VERY appreciated, thank you!
When I enter the following line in version 6.2.6:
Code:
hashcat.exe -a 3 -m 9400 -o pass.txt hash.txt ?a?a?a?a --increment
...it runs for a very short while and just stops at initiating self-test. Here's the command prompt:
Code:
hashcat.exe -a 3 -m 9400 -o pass.txt hash.txt ?a?a?a?a --increment
hashcat (v6.2.6) starting
OpenCL API (OpenCL 1.2 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics 600, 736/1567 MB (391 MB allocatable), 12MCU
* Device #2: Intel(R) Celeron(R) N4000 CPU @ 1.10GHz, skipped
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Host memory required for this attack: 141 MB
Starting self-test. Please be patient...
When pressing a key, the menu
Code:
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit =>
To counter this I added the
Code:
--self-test-disable
Code:
Initialized device kernels and memory
Here's the command prompt for detail:
Code:
hashcat.exe -a 3 -m 9400 -o pass.txt hash.txt ?a?a?a?a --increment --self-test-disable
hashcat (v6.2.5) starting
OpenCL API (OpenCL 1.2 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics 600, 736/1567 MB (391 MB allocatable), 12MCU
* Device #2: Intel(R) Celeron(R) N4000 CPU @ 1.10GHz, skipped
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Host memory required for this attack: 141 MB
Initialized device kernels and memory
Any help would be VERY appreciated, thank you!