With the most recent oclHashcat (2.01) and AMD GPUs every time I try and run a brute force attack (-a3) against a WPA hash (algorithm 2500) ocl will lock up. You can press the status key once and it will print out each GPU is running at 0 H/s. After you press status key once you do not get the prompt back.
Dictionary attacks work just fine.
kill and kill -9 of the oclHashcat64.bin process does not do anything. The machine has to be rebooted to recover from the failure.
Its not really a critical bug for me, brute force attack typically yields nothing useful for WPA. However I figured you may want to know about the issue.
Details:
Debian kernel 3.16.0-4
fglrx 15.20.3
oclHashcat 2.01
Command line used:
oclHashcat64.bin -a3 -m2500 hash.hccap
Dictionary attacks work just fine.
kill and kill -9 of the oclHashcat64.bin process does not do anything. The machine has to be rebooted to recover from the failure.
Its not really a critical bug for me, brute force attack typically yields nothing useful for WPA. However I figured you may want to know about the issue.
Details:
Debian kernel 3.16.0-4
fglrx 15.20.3
oclHashcat 2.01
Command line used:
oclHashcat64.bin -a3 -m2500 hash.hccap