Gordon, Stanley 2016 / 8 / 25
In the real world, GPU cracking is slower than CPU, because it works too fast, computing device can't get enough work to do.
Generating candidates on host, then send it to computing device is still slow, cause the bottle neck is I/O, not compute power.
We accomplish this by splitting attacks up into two loops
That's where our acceleration comes from
Straight mode
Hybrid modes
I think we can test if our hardware has a huge computing power gap between CPU and GPUs.
Maybe the default amplifier that hashcat distribute for us is not sutiable for our system.
Statistics Will Crack Your Password
https://www.praetorian.com/blog/statistics-will-crack-your-password-mask-structure
Common Rules
https://github.com/praetorian-inc/Hob0Rules
A set of small utilities that are useful in advanced password cracking
Can be used to pre-generate wordlists
https://github.com/hashcat/hashcat-utils
examples:
$ hashcat <dictonary> <rules> --stdout
Run hashcat with --stdout
Hashcat will print out candidates instead of cracking the hashes
$ hashcat --debug-mode=1 --debug-file=match.rule
save the matched rules
then we can see which rule is used the most
$ cat match.rule | sort | uniq -c | sort -nr