6970 users wanted
#11
(08-17-2012, 08:17 PM)proinside Wrote: mastercracker, you mean simple dictionary with no rules at all ?

I don't want to "waste" time cleaning the actual driver to install
a new version that do not brings nothing new about this specific
problem. Tks.
Yes, simple dictionary attack works. I did not test with rules so I don't know. For sure, combination, bruteforce and both hybrid attack fails. Those are the -a 1, -a 3, -a 6 and -a 7.
#12
@mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711).
#13
(08-17-2012, 11:42 PM)atom Wrote: @mastercracker are you sure? this is about -m 2611 which you said is completly fixed (not 2711).
You are right Atom. -m 2611 works completely. -m 2711 and -m 2811 works only with dictionary mode.
#14
1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist.

sha512($pass.$salt)
0/663

I also tested to crack a single hash but it failed.
#15
(08-18-2012, 10:36 AM)K9 Wrote: 1710 the salted sha512 is still bugged for me. Im not able to crack them with GPU but CPU works. I tried to use the found passwords of the CPU against the hashlist.

sha512($pass.$salt)
0/663

I also tested to crack a single hash but it failed.
Yes, it depends on which oclhashcat-plus version you use. In the latest beta, it's almost completely fixed. At least for my HD5750 using catalyst 12.8.
#16
It is working with small salts but there is a problem with longer salts I think. I sent you a file via pm.