Luzm Posted May 18, 2015 Share Posted May 18, 2015 I got a question, I'm trying to find more info on oclhashcat on drivers I read that it's only available for nvidia, but I'm also trying to find drivers for or if anyone knows away around for intel corporation mobile gm965/gl960. Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted May 18, 2015 Share Posted May 18, 2015 Hashcat supports NVidia and AMD GPUs. The program without the GPU part should run on any supported architecture. http://hashcat.net/hashcat/ Quote Link to comment Share on other sites More sharing options...
cooper Posted May 18, 2015 Share Posted May 18, 2015 According to the comments here you can compile Pyrit against Intel's OpenCL libraries to get a working setup. Quote Link to comment Share on other sites More sharing options...
Luzm Posted May 18, 2015 Author Share Posted May 18, 2015 Thanks guys for info I'll check it out more Quote Link to comment Share on other sites More sharing options...
Luzm Posted May 19, 2015 Author Share Posted May 19, 2015 What am I doing wrong, I made hashes at md5.cz I identified hashes, and RTM lol, unless options or the way I wrote it are wrong or misunderstood hashcat --help manual Quote Link to comment Share on other sites More sharing options...
cooper Posted May 20, 2015 Share Posted May 20, 2015 By specifying the format as 6 instances of a lowercase char (I think that's what the 'l' means) the length variation provided by pw-min and pw-max is overruled. Are any of your hashes for words of exactly 6 characters? Quote Link to comment Share on other sites More sharing options...
Luzm Posted May 20, 2015 Author Share Posted May 20, 2015 No, hashes range from 7 - 11 length. Quote Link to comment Share on other sites More sharing options...
cooper Posted May 20, 2015 Share Posted May 20, 2015 Then because you specified the format as 6 chars in length total, none of your hashes will be decrypted. Quote Link to comment Share on other sites More sharing options...
Luzm Posted May 21, 2015 Author Share Posted May 21, 2015 Real world scenario, I asked my cousin to make me random hashes, without letting me know pwd lengths, would that help with brute forcing to decrypt? That's why I did the 6-12 min and max but then again I don't know lengths, or it's the wrong format to brute force. Cause no one really knows the length of pwd hash in a real world scenario. Quote Link to comment Share on other sites More sharing options...
cooper Posted May 21, 2015 Share Posted May 21, 2015 You're currently still in the phase of "Is my input file valid and are my command line parameters correct". Make your own hash out of something simple and quickly guessed so you can retry faster when the result isn't what you expect. Once you find it you know how to handle your cousin's hashes (or any other hash). Quote Link to comment Share on other sites More sharing options...
Luzm Posted May 21, 2015 Author Share Posted May 21, 2015 I decrypted my hashes quick, cause I knew min and max, but my cousin hashes are lame lol still can not get his, I'll figure out something, read more, is there a brute force with out doing min an max, or just leave that out. Quote Link to comment Share on other sites More sharing options...
Luzm Posted May 22, 2015 Author Share Posted May 22, 2015 Password length increment "A Mask attack is always specific to a password length. For example, if we use the mask “?l?l?l?l?l?l?l?l” we can only crack a password of the length 8. But if the password we try to crack has the length 7 we will not find it. Thats why we have to repeat the attack several times, each time with one placeholder added to the mask. This is transparently automated by using the “--increment” flag" Makes sense. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.