I wanted to decrypt some DES Unix hashes mod 1500 , and every time hashcat tells me Exhausted as it doesnt find a crack from the wordlist , so i hashed a string that is already in the wordlist by python crypt module
==> "password" ===> XYGpusIMIT/IM
and i tried the command on it and the same issue occurred even though its already in the wordlist hashcat didnt decrypt it , this is the command :
and this the output :
more info about descrypt : https://www.onlinehashcrack.com/how-desc...-works.php
==> "password" ===> XYGpusIMIT/IM
and i tried the command on it and the same issue occurred even though its already in the wordlist hashcat didnt decrypt it , this is the command :
Code:
.\hashcat.exe -m 1500 -a 0 -o cracked.txt ..\s.txt ..\10-million-password-list-top-1000000.txt
and this the output :
Code:
hashcat (v6.2.6) starting
hiprtcCompileProgram is missing from HIPRTC shared library.
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
* Device #2: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
The device #2 specifically listed was skipped because it is an alias of device #1
ADL2_Overdrive_Caps(): -8
ADL2_Overdrive_Caps(): -8
nvmlDeviceGetFanSpeed(): Not Supported
ADL_Overdrive5_FanSpeed_Get(): -100
ADL_Overdrive5_Temperature_Get(): -100
CUDA API (CUDA 12.5)
====================
* Device #1: NVIDIA GeForce GTX 1650, 3296/4095 MB, 14MCU
OpenCL API (OpenCL 3.0 CUDA 12.5.51) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #2: NVIDIA GeForce GTX 1650, skipped
OpenCL API (OpenCL 2.1 AMD-APP (3584.0)) - Platform #2 [Advanced Micro Devices, Inc.]
=====================================================================================
* Device #3: AMD Radeon(TM) Graphics, 1536/3144 MB (1118 MB allocatable), 7MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 8
Hashes: 10 digests; 10 unique digests, 5 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Zero-Byte
* Not-Iterated
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 366 MB
Dictionary cache hit:
* Filename..: ..\10-million-password-list-top-1000000.txt
* Passwords.: 999998
* Bytes.....: 8529108
* Keyspace..: 999998
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 1500 (descrypt, DES (Unix), Traditional DES)
Hash.Target......: ..\s.txt
Time.Started.....: Wed Sep 04 13:23:41 2024 (1 sec)
Time.Estimated...: Wed Sep 04 13:23:42 2024 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (..\10-million-password-list-top-1000000.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 15147.7 kH/s (6.91ms) @ Accel:512 Loops:1 Thr:64 Vec:1
Speed.#3.........: 2466.9 kH/s (7.63ms) @ Accel:128 Loops:1 Thr:64 Vec:1
Speed.#*.........: 17614.6 kH/s
Recovered........: 0/10 (0.00%) Digests (total), 0/10 (0.00%) Digests (new), 0/5 (0.00%) Salts
Progress.........: 4999990/4999990 (100.00%)
Rejected.........: 915240/4999990 (18.30%)
Restore.Point....: 981276/999998 (98.13%)
Restore.Sub.#1...: Salt:4 Amplifier:0-1 Iteration:0-1
Restore.Sub.#3...: Salt:4 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: 85999 -> vT0IfTv7
Candidates.#3....: vt0bxrf -> vjht008
Hardware.Mon.#1..: Temp: 42c Util: 4% Core:1770MHz Mem:5000MHz Bus:8
Hardware.Mon.#3..: Util: 22% Core: 200MHz Mem:1600MHz Bus:16
Driver temperature threshold met on GPU #1. Expect reduced performance.
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => Started: Wed Sep 04 13:23:37 2024
Stopped: Wed Sep 04 13:23:42 2024
more info about descrypt : https://www.onlinehashcrack.com/how-desc...-works.php