Hashcat - OSX
#11
looks perfect, whats the problem?
#12
(08-06-2012, 02:03 PM)atom Wrote: looks perfect, whats the problem?

Hi Atom,

No problem at all, all is ok, just whant to know how to reduce the number of working Core's, like you can see in the screen capture all 8 one's are running & that not permited me to run another extra "app", so i just say & imagine the Option = "-n" can do the job ? can you confim please ?

Beside, with hashcat may exist an "--test" option for benchmark all the avaible hashes / algo's ? ( i see many members here on board on "Hardware section" posted them bench's, or maybe it's an option avaible only on OclHashcat ?

Anyway, i'm just really happy & enjoy a lot to be able to use hashcat on MAC, hope you can launch ASAP the GPU compatible version ;-)))

Thanks again for all your effort's,

Regards,

Tony
#13
yes you can use -n
benchmark is not planed yet - you can still do your own as you already did.
#14
(08-06-2012, 02:57 PM)atom Wrote: yes you can use -n
benchmark is not planed yet - you can still do your own as you already did.

Ok Atom, thanks for confirmation of the "-n" option

& for bench, ok, understand
#15
Hi,

I have one question about the "Hybrid" attack mode, like i see it's seem not operated in hashcat & avaible only on OCLHashcat suites.

Like it's mentioned here : http://hashcat.net/wiki/hybrid_attack

So my question, it's : May exist another way to play with Mask & DIC's or only RULES + DIC'S are avaible for hashcat ? it will be nice to have the avaibility to play with Mask's on the right & left of an dic..

& in function of your reply in the case is negative, may you plan to implemented this function to Hashcat ?

Thanks in advance,

Regards,

Tony
#16
No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki);
http://hashcat.net/wiki/hybrid_atttack_with_rules
#17
(08-09-2012, 11:02 AM)atom Wrote: No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki);
http://hashcat.net/wiki/hybrid_atttack_with_rules

Hi Atom,

Thanks for reply, yep i see that, but no yet on Mac_OSX i think ;-) ( $ ./mp64.bin ====> bynaries = Linux...maybe you plan to compiled the source for an OSX compatible ? )

Regards,

Tony
#18
(08-09-2012, 01:52 PM)tony Wrote:
(08-09-2012, 11:02 AM)atom Wrote: No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki);
http://hashcat.net/wiki/hybrid_atttack_with_rules

Hi Atom,

Thanks for reply, yep i see that, but no yet on Mac_OSX i think ;-) ( $ ./mp64.bin ====> bynaries = Linux...maybe you plan to compiled the source for an OSX compatible ? )

Regards,

Tony

Aren't the sources included? You should be able to compile it yourself.
#19
(08-09-2012, 03:02 PM)radix Wrote:
(08-09-2012, 01:52 PM)tony Wrote:
(08-09-2012, 11:02 AM)atom Wrote: No, but you can emulate hybrid attack in hashcat CPU using rules (see wiki);
http://hashcat.net/wiki/hybrid_atttack_with_rules

Hi Atom,

Thanks for reply, yep i see that, but no yet on Mac_OSX i think ;-) ( $ ./mp64.bin ====> bynaries = Linux...maybe you plan to compiled the source for an OSX compatible ? )

Regards,

Tony

Aren't the sources included? You should be able to compile it yourself.

Hi Radix,

No it seem only avaible with the Bynaries for Linux & Win = http://hashcat.net/wiki/maskprocessor

Just download it & i find inside only ".bin" & ".exe"

in the case we talk about Maskprocessor for sure, cause i see : $./mp64 so i imagine is that one....

Thanks,

Tony
#20
No, maskprocessor is closed source. But all that counts for you is the outfile. So you can generate the outfile on Linux or Windows and copy it to Mac