|
Message-ID: <CABgzwqvJHGrvBwminXB4GYk2BUVu4dMgb6h3rf8kgnFqayFsnA@mail.gmail.com> Date: Sun, 5 Jan 2020 17:04:34 -0300 From: Ricardo CYRYLZ MIESZKO <cyrylz.mieszko@...il.com> To: john-users@...ts.openwall.com Subject: opencl not finds the password. In CPU it founds. Hi. When I use john with wordlist and --format=dmg-opencl or --format=7z-opencl it can't find the password. If I use without the opencl it finds. I noted that error and I can't find a solution fot that: "Error creating binary cache file: No such file or directory" Much probably the binary creation error is the problem. How to solve it ? I can't even find this error message in the John sources. That's weird. It comes from some dependency maybe ? I'm running on macOS Catalina, but the problem occurs in older macOS too. Here is the opencl version: 0:00:00:00 - Building kernel and caching binary 0:00:00:00 - OpenCL LWS: 64, GWS: 8192 (both auto-tuned) (128 blocks) 0:00:00:00 - Hash type: 7z-opencl, 7-Zip (min-len 0, max-len 23) 0:00:00:00 - Algorithm: SHA256 AES OpenCL 0:00:00:00 - Will reject candidates longer than 69 bytes 0:00:00:00 - Candidate passwords will be buffered and tried in chunks of 8192 0:00:00:00 Proceeding with wordlist mode 0:00:00:00 - Wordlist file: dic.lst 0:00:00:00 - memory mapping wordlist (1353024 bytes) 0:00:00:00 - No word mangling rules Device 3: AMD Radeon Pro 560X Compute Engine Using default input encoding: UTF-8 Loaded 1 password hash (7z-opencl, 7-Zip [SHA256 AES OpenCL]) Cost 1 (iteration count) is 524288 for all loaded hashes Cost 2 (padding size) is 7 for all loaded hashes Cost 3 (compression type) is 1 for all loaded hashes Error creating binary cache file: No such file or directory Press 'q' or Ctrl-C to abort, almost any other key for status 0:00:00:00 Starting a new session 0:00:00:00 Loaded a total of 1 password hash 0:00:00:00 Cost 1 (iteration count) is 524288 for all loaded hashes 0:00:00:00 Cost 2 (padding size) is 7 for all loaded hashes 0:00:00:00 Cost 3 (compression type) is 1 for all loaded hashes 0:00:00:00 Command line: john --format=7z-opencl --pot=passwd.pot --session=dic --wordlist=dic.lst hash.sec 0:00:00:00 - UTF-8 input encoding enabled 0:00:00:00 - Passwords will be stored UTF-8 encoded in .pot file 0:00:00:00 Device 3: AMD Radeon Pro 560X Compute Engine 0:00:00:00 - Building kernel and caching binary 0:00:00:00 - OpenCL LWS: 64, GWS: 8192 (both auto-tuned) (128 blocks) 0:00:00:00 - Hash type: 7z-opencl, 7-Zip (min-len 0, max-len 23) 0:00:00:00 - Algorithm: SHA256 AES OpenCL 0:00:00:00 - Will reject candidates longer than 69 bytes 0:00:00:00 - Candidate passwords will be buffered and tried in chunks of 8192 0:00:00:00 Proceeding with wordlist mode 0:00:00:00 - Wordlist file: dic.lst 0:00:00:00 - memory mapping wordlist (1353024 bytes) 0:00:00:00 - No word mangling rules Warning: Only 5696 candidates left, minimum 8192 needed for performance. 0:00:00:00 - No stacked rules 0g 0:00:01:11 DONE (2020-01-05 15:51) 0g/s 652.8p/s 652.8c/s 652.8C/s [xxxxxxx REMOVED] Session completed --------------------- ==> Passwords Found ? --------------------- 0 password hashes cracked, 1 left ---------------------- Here is without opencl: 0:00:00:00 - Configured to use otherwise idle processor cycles only 0:00:00:00 - Will reject candidates longer than 84 bytes 0:00:00:00 - Candidate passwords will be buffered and tried in chunks of 4 0:00:00:00 Proceeding with wordlist mode 0:00:00:00 - Wordlist file: dic.lst 0:00:00:00 - memory mapping wordlist (1353024 bytes) 0:00:00:00 - No word mangling rules 0:00:00:00 - No stacked rules 0:00:06:02 + Cracked x.7z 0:00:06:02 Session completed Using default input encoding: UTF-8 Loaded 1 password hash (7z, 7-Zip [SHA256 128/128 SSE4.1 4x AES]) Cost 1 (iteration count) is 524288 for all loaded hashes Cost 2 (padding size) is 7 for all loaded hashes Cost 3 (compression type) is 1 for all loaded hashes Press 'q' or Ctrl-C to abort, almost any other key for status 0:00:00:00 Starting a new session 0:00:00:00 Loaded a total of 1 password hash 0:00:00:00 Cost 1 (iteration count) is 524288 for all loaded hashes 0:00:00:00 Cost 2 (padding size) is 7 for all loaded hashes 0:00:00:00 Cost 3 (compression type) is 1 for all loaded hashes 0:00:00:00 Command line: john --format=7z --pot=passwd.pot --session=dic --wordlist=dic.lst hash.sec 0:00:00:00 - UTF-8 input encoding enabled 0:00:00:00 - Passwords will be stored UTF-8 encoded in .pot file 0:00:00:00 - Hash type: 7z, 7-Zip (min-len 0, max-len 28) 0:00:00:00 - Algorithm: SHA256 128/128 SSE4.1 4x AES 0:00:00:00 - Configured to use otherwise idle processor cycles only 0:00:00:00 - Will reject candidates longer than 84 bytes 0:00:00:00 - Candidate passwords will be buffered and tried in chunks of 4 0:00:00:00 Proceeding with wordlist mode 0:00:00:00 - Wordlist file: dic.lst 0:00:00:00 - memory mapping wordlist (1353024 bytes) 0:00:00:00 - No word mangling rules 0:00:00:00 - No stacked rules [****REMOVED] (x.7z) 1g 0:00:05:56 DONE (2020-01-05 17:01) 0.002804g/s 8.481p/s 8.481c/s 8.481C/s [****REMOVED] Use the "--show" option to display all of the cracked passwords reliably Session completed --------------------- ==> Passwords Found ? --------------------- x.7z:**************** [passwd removed] ---------------------- 1 password hash cracked, 0 left ---------------------- Regards.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.