01-17-2018, 04:11 AM
Crackpos is the # of iterations tried to guess a password right?
it doesnt seem so:
So im using hashcat along prince processor, no the issue is not coming from the latter; i can assure youthis is an issue with hashcat. along side these 2 programs running at once, i also have to run a python script to parse some data (the hash/sec) . without the python script i can see the hashcat output every 10 seconds. when i read that output, i see that the num of guesses is somewhere in the billions. when i run the python script, (which writes to a different file than the outfile) i cant see that; its reading from stdin. anyway, when i look at the file (irregardless of if i use the python thing or not) the crack pos values for my hashes is magnitudes lower than what it actually should be (talking about hundreds of thousands compared to trillions and billions) . why is this. I used outfile 10 or plain:crackpos. Do i just not know what crack pos is?
please help
thanks
it doesnt seem so:
So im using hashcat along prince processor, no the issue is not coming from the latter; i can assure youthis is an issue with hashcat. along side these 2 programs running at once, i also have to run a python script to parse some data (the hash/sec) . without the python script i can see the hashcat output every 10 seconds. when i read that output, i see that the num of guesses is somewhere in the billions. when i run the python script, (which writes to a different file than the outfile) i cant see that; its reading from stdin. anyway, when i look at the file (irregardless of if i use the python thing or not) the crack pos values for my hashes is magnitudes lower than what it actually should be (talking about hundreds of thousands compared to trillions and billions) . why is this. I used outfile 10 or plain:crackpos. Do i just not know what crack pos is?
please help
thanks