CL_OUT_OF_HOST_MEMORY
#1
Hello everyone

I just tried to crack an WPA hccapx file with hashcat but I got this

Code:
Crunch will now generate the following amount of data: 17575569559640669184 bytes
16761369285240 MB
16368524692 GB
15984887 TB
15610 PB
Crunch will now generate the following number of lines: 2580393341448059904
hashcat (v5.1.0) starting...

OpenCL Platform #1: The pocl project
====================================
* Device #1: pthread-AMD Ryzen 5 2600 Six-Core Processor, skipped.

OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #2: gfx1010, 6732/8176 MB allocatable, 20MCU

Hashes: 2 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63

Watchdog: Temperature abort trigger set to 90c

clCreateCommandQueue(): CL_OUT_OF_HOST_MEMORY

Started: Sat Jul 11 16:38:52 2020
Stopped: Sat Jul 11 16:38:52 2020

My computer run Ubuntu 20.04
Processor: Ryzen 5 2600
Graphic Card: Rx 5700xt (openCL is enabled)

Sorry for my English I'm french Smile
Thx for your help
#2
1. why do you use crunch ?
2. why do you use hashcat 5.1.0 if hashcat 6.0.0 is available (https://hashcat.net/hashcat/) ?
3. what is your command ?
4. why don't you give your full specs ? if the error says "out of host memory" , you should at least specify how much RAM you have
#3
Thank you for your answer
I will answer each of your questions

1. I use crunch to create a wordlist with all the passwords that I will test with hashcat on the file
2. Idk I just do "apt-get install hashcat" today and this is the version that was installed
3. the command is "crunch 10 20 abcdefghijklmnopqrstuvwxyz0123456789 | hashcat -m 2500 -d 2 file.hccapx"
4. I got 16GB RAM and 8GB VRAM
#4
- you should download hashcat directly from https://hashcat.net/hashcat/
- don't use crunch, use this instead:
Code:
hashcat -m 2500 -a 0 -w 3 -r my.rule -d 2 file.hccapx dict.txt

where my.rule is a rule file like the ones in rules/ folder , but that doesn't shorten the passwords to < 8 characters
where dict.txt is a dictionary file that does contain very likely/good password candidates

This makes sense, because WPA/WPA2 has a minimum password length of 8 chars/bytes and brute-forcing (trying all these different characters) a password that is 10+ characters long is infeasible (not possible, even with a lot of GPUs)

If that command still doesn't work, try to see if a benchmark works:
Code:
hashcat -m 2500 -b
#5
I inquired and found that hashcat 6.0.0 is only available on the latest version of ubuntu (20.10) . I update my computer and test everything
#6
Solve !
I updated my computer to get the latest version of hashcat.
Many thanks to philsmd
#7
Excellent!

(And just for the record, you can download hashcat 6.0.0 and run it on older versions of Ubuntu)
~