08-06-2012, 03:20 AM
BUgs for v0.09b41 with catalyst 12.6 on HD5750 GPU under Windows 7 64 bit.
I decided to put it in a different thread since it's a different bug pattern than CUDA cards and it might be followed by different people as well. For reference on passwords, attacks done, etc refer to the first topic at: http://hashcat.net/forum/thread-1430.html
- Status bar at the bottom not always appearing (really intermittent).
- The following algos where making the driver crash: 2100, 1600, 400 and 500. Heavy algos basically. I tried also with accel and loops at 1 and it still crashed. These are the lines it crashes on, the others work:
oclhashcat-plus64.exe -a 3 -d 1 -m 2100 -o found.txt -1 ?s?d?u?l --bf-min 4 --bf-max 4 hash.txt ?u?d?s?d
oclhashcat-plus64.exe -a 3 -d 1 -m 2100 -o found.txt -1 abcd --bf-min 8 --bf-max 8 hash.txt ?1?1?1?1?1?1?1?1
oclhashcat-plus64.exe -a 6 -d 1 -m 2100 -o found.txt hash.txt dic1.txt ?u?l?l
oclhashcat-plus64.exe -a 7 -d 1 -m 2100 -o found.txt hash.txt ?u?l?l dic1.txt
oclhashcat-plus64.exe -a 7 -d 1 -m 2100 -o found.txt hash.txt ?l?l?l?l dic1.txt
oclhashcat-plus64.exe -a 7 -d 1 -m 2100 -o found.txt hash.txt ?d?d?d?d dic1.txt
In summary, it crashes on bruteforce length 4 and 8, on length 15 for -a 6 and on length 8, 12, 15 on -a 7.
Additional notes: I have noticed that for those that crashes, the rejected shows 100%.
- Algos where nothing works: 2811, 11, 2711
- For -m 900 MD4, bruteforce 2 to 12 characters does not work but length 15 works.
- For -m 2600 DoubleMD5, -a 0 dictionary and -a 3 bruteforce are not working. In Combinatory and hybrid with mask are working perfectly well.
- For -m 0 MD5, bruteforce on length 2,4 and 8 are not working while length 12 and 15 are working fine.
- For -m 1000 NTLM, bruteforce on length 2,4 and 8 are not working while length 12 and 15 are working fine.
- For -m 1400 SHA256, weird pattern. For -a 3, length 2 and 8 are not working. For -a 6, length 4 is not working. For -a 7 length 4 and 12 are not working.
- For -m 121 SMF, bruteforce mode is not working.
- For -m 2611 Vbulletin < 3.8.5, -a 0 dictionary and -a 3 bruteforce are not working. In Combinatory and hybrid with mask are working perfectly well.
- Algo tested that works 100%: 1100, 300, 21, 101, 100, 1700.
I decided to put it in a different thread since it's a different bug pattern than CUDA cards and it might be followed by different people as well. For reference on passwords, attacks done, etc refer to the first topic at: http://hashcat.net/forum/thread-1430.html
- Status bar at the bottom not always appearing (really intermittent).
- The following algos where making the driver crash: 2100, 1600, 400 and 500. Heavy algos basically. I tried also with accel and loops at 1 and it still crashed. These are the lines it crashes on, the others work:
oclhashcat-plus64.exe -a 3 -d 1 -m 2100 -o found.txt -1 ?s?d?u?l --bf-min 4 --bf-max 4 hash.txt ?u?d?s?d
oclhashcat-plus64.exe -a 3 -d 1 -m 2100 -o found.txt -1 abcd --bf-min 8 --bf-max 8 hash.txt ?1?1?1?1?1?1?1?1
oclhashcat-plus64.exe -a 6 -d 1 -m 2100 -o found.txt hash.txt dic1.txt ?u?l?l
oclhashcat-plus64.exe -a 7 -d 1 -m 2100 -o found.txt hash.txt ?u?l?l dic1.txt
oclhashcat-plus64.exe -a 7 -d 1 -m 2100 -o found.txt hash.txt ?l?l?l?l dic1.txt
oclhashcat-plus64.exe -a 7 -d 1 -m 2100 -o found.txt hash.txt ?d?d?d?d dic1.txt
In summary, it crashes on bruteforce length 4 and 8, on length 15 for -a 6 and on length 8, 12, 15 on -a 7.
Additional notes: I have noticed that for those that crashes, the rejected shows 100%.
- Algos where nothing works: 2811, 11, 2711
- For -m 900 MD4, bruteforce 2 to 12 characters does not work but length 15 works.
- For -m 2600 DoubleMD5, -a 0 dictionary and -a 3 bruteforce are not working. In Combinatory and hybrid with mask are working perfectly well.
- For -m 0 MD5, bruteforce on length 2,4 and 8 are not working while length 12 and 15 are working fine.
- For -m 1000 NTLM, bruteforce on length 2,4 and 8 are not working while length 12 and 15 are working fine.
- For -m 1400 SHA256, weird pattern. For -a 3, length 2 and 8 are not working. For -a 6, length 4 is not working. For -a 7 length 4 and 12 are not working.
- For -m 121 SMF, bruteforce mode is not working.
- For -m 2611 Vbulletin < 3.8.5, -a 0 dictionary and -a 3 bruteforce are not working. In Combinatory and hybrid with mask are working perfectly well.
- Algo tested that works 100%: 1100, 300, 21, 101, 100, 1700.