I'm using oclHashcat to do security audits for my community. For this, I need to know that a password was cracked, but not what the actual value is.
I would like to be able to run the cracker so that I get a list of cracked hashes without the actual password. This will make the process less prone to abuse by other admins, and improves security by not storing passwords (even ones which need to be changed) in an unhashed format.
This feature would probably be applicable across the line of tools, but oclHashcat is the tool I'm using, so I started the thread here.
Thanks for a fantastic tool!
(also, sorry it looks like I posted in the wrong section...)
I would like to be able to run the cracker so that I get a list of cracked hashes without the actual password. This will make the process less prone to abuse by other admins, and improves security by not storing passwords (even ones which need to be changed) in an unhashed format.
This feature would probably be applicable across the line of tools, but oclHashcat is the tool I'm using, so I started the thread here.
Thanks for a fantastic tool!
(also, sorry it looks like I posted in the wrong section...)