11-04-2012, 01:53 AM
Hello all,
I'm having some trouble cracking some passwords that have a long static base string followed by unknown characters. For instance a password scheme like:
ThisPartIsAlwaysTheSame
ThisPartIsAlwaysTheSame1
ThisPartIsAlwaysTheSame!
ThisPartIsAlwaysTheSame1234
ThisPartIsAlwaysTheSame123456
ThisPartIsAlwaysTheSame1@E$56
ThisPartIsAlwaysTheSameVanessa
I'm invoking as follows (this run's hash is ThisPartIsAlwaysTheSame1234):
C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 C88C5A5162DE00A89E78A6265C4C0AAB ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40
oclHashcat-lite v0.10 by atom starting...
Password lengths range: 23 - 40
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cayman, 2048MB, 880Mhz, 24MCU
Device #2: Cayman, 2048MB, 880Mhz, 24MCU
c88c5a5162de00a89e78a6265c4c0aab:ThisPartIsAlwaysTheSame1234
Status.......: Cracked
Hash.Target..: c88c5a5162de00a89e78a6265c4c0aab
Hash.Type....: NTLM
Time.Running.: 0 secs
Time.Left....: 0 secs
Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a
Plain.Text...: **isPartIsAlwaysTheSame4\\4
Plain.Length.: 27
Progress.....: 17694720/81450625 (21.72%)
Speed.GPU.#1.: 117.0M/s
Speed.GPU.#2.: 117.4M/s
Speed.GPU.#*.: 234.4M/s
HWMon.GPU.#1.: 0% Util, 69c Temp, 32% Fan
HWMon.GPU.#2.: 0% Util, 69c Temp, 32% Fan
Started: Sat Nov 03 16:39:51 2012
Stopped: Sat Nov 03 16:39:53 2012
This works great until I get over a password length of 27, at which point it seems to truncate what I've asked for.
Invoking with hash for ThisPartIsAlwaysTheSame123456:
C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 2056CE87BA07FD7F40A5A5C49A1A5873 ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40
oclHashcat-lite v0.10 by atom starting...
Password lengths range: 23 - 40
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cayman, 2048MB, 880Mhz, 24MCU
Device #2: Cayman, 2048MB, 880Mhz, 24MCU
[s]tatus [p]ause [r]esume [q]uit =>
Status.......: Exhausted
Hash.Target..: 2056ce87ba07fd7f40a5a5c49a1a5873
Hash.Type....: NTLM
Time.Running.: 0 secs
Time.Left....: 0 secs
Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a
Plain.Text...: **isPartIsAlwaysTheSame
Plain.Length.: 27
Progress.....: 81450625/81450625 (100.00%)
Speed.GPU.#1.: 117.7M/s
Speed.GPU.#2.: 118.8M/s
Speed.GPU.#*.: 236.5M/s
HWMon.GPU.#1.: 0% Util, 70c Temp, 32% Fan
HWMon.GPU.#2.: 0% Util, 70c Temp, 32% Fan
Started: Sat Nov 03 16:43:16 2012
Stopped: Sat Nov 03 16:43:18 2012
It gives up at ThisPartIsAlwaysTheSame?a?a?a?a without processing the full mask specified.
Do I need a specific switch to get it to go beyond a length of 27, or is there a bug here?
I'm having some trouble cracking some passwords that have a long static base string followed by unknown characters. For instance a password scheme like:
ThisPartIsAlwaysTheSame
ThisPartIsAlwaysTheSame1
ThisPartIsAlwaysTheSame!
ThisPartIsAlwaysTheSame1234
ThisPartIsAlwaysTheSame123456
ThisPartIsAlwaysTheSame1@E$56
ThisPartIsAlwaysTheSameVanessa
I'm invoking as follows (this run's hash is ThisPartIsAlwaysTheSame1234):
C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 C88C5A5162DE00A89E78A6265C4C0AAB ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40
oclHashcat-lite v0.10 by atom starting...
Password lengths range: 23 - 40
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cayman, 2048MB, 880Mhz, 24MCU
Device #2: Cayman, 2048MB, 880Mhz, 24MCU
c88c5a5162de00a89e78a6265c4c0aab:ThisPartIsAlwaysTheSame1234
Status.......: Cracked
Hash.Target..: c88c5a5162de00a89e78a6265c4c0aab
Hash.Type....: NTLM
Time.Running.: 0 secs
Time.Left....: 0 secs
Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a
Plain.Text...: **isPartIsAlwaysTheSame4\\4
Plain.Length.: 27
Progress.....: 17694720/81450625 (21.72%)
Speed.GPU.#1.: 117.0M/s
Speed.GPU.#2.: 117.4M/s
Speed.GPU.#*.: 234.4M/s
HWMon.GPU.#1.: 0% Util, 69c Temp, 32% Fan
HWMon.GPU.#2.: 0% Util, 69c Temp, 32% Fan
Started: Sat Nov 03 16:39:51 2012
Stopped: Sat Nov 03 16:39:53 2012
This works great until I get over a password length of 27, at which point it seems to truncate what I've asked for.
Invoking with hash for ThisPartIsAlwaysTheSame123456:
C:\Crack\oclHashcat-lite-0.10>oclHashcat-lite64.exe -m 1000 2056CE87BA07FD7F40A5A5C49A1A5873 ThisPartIsAlwaysTheSame?a?a?a?a?a?a --pw-min=23 --pw-max=40
oclHashcat-lite v0.10 by atom starting...
Password lengths range: 23 - 40
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cayman, 2048MB, 880Mhz, 24MCU
Device #2: Cayman, 2048MB, 880Mhz, 24MCU
[s]tatus [p]ause [r]esume [q]uit =>
Status.......: Exhausted
Hash.Target..: 2056ce87ba07fd7f40a5a5c49a1a5873
Hash.Type....: NTLM
Time.Running.: 0 secs
Time.Left....: 0 secs
Plain.Mask...: ThisPartIsAlwaysTheSame?a?a?a?a
Plain.Text...: **isPartIsAlwaysTheSame
Plain.Length.: 27
Progress.....: 81450625/81450625 (100.00%)
Speed.GPU.#1.: 117.7M/s
Speed.GPU.#2.: 118.8M/s
Speed.GPU.#*.: 236.5M/s
HWMon.GPU.#1.: 0% Util, 70c Temp, 32% Fan
HWMon.GPU.#2.: 0% Util, 70c Temp, 32% Fan
Started: Sat Nov 03 16:43:16 2012
Stopped: Sat Nov 03 16:43:18 2012
It gives up at ThisPartIsAlwaysTheSame?a?a?a?a without processing the full mask specified.
Do I need a specific switch to get it to go beyond a length of 27, or is there a bug here?