1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-01 13:09:11 +00:00
hashcat/docs/limits.txt

84 lines
2.6 KiB
Plaintext
Raw Normal View History

2017-12-04 09:51:49 +00:00
##
## Maximum password lengths vary depending on kernel, hash type, and encoding
##
See https://hashcat.net/faq/lengths
##
## Generic hash modes only support salt lengths up to 256
##
This limitation on salt lengths only affects generic hash modes, such as md5(pass.salt).
Dedicated hash modes allow unlimited salt length support.
##
## File and folder names including UTF-16 characters are not supported
##
UTF-16 is mostly seen on Windows. UTF-8 (as mostly used on Linux and macOS) are fine.
2018-11-01 19:17:02 +00:00
Important: That does not mean UTF-16 file content, which is fully supported.
2017-12-04 09:51:49 +00:00
It only means the filename itself.
##
## Hashing algorithms that internally use UTF-16 characters could in special cases lead to false negatives
##
The UTF-16 conversion implementation used within the kernel code is very elementary and for performance
reasons does not respect all complicated encoding rules required to correctly convert, for instance, ASCII
or UTF-8 to UTF-16LE (or UTF-16BE).
The implementation most likely fails with multi-byte characters, because we basically add a zero byte every
second byte within the kernel conversion code.
2017-12-04 09:51:49 +00:00
##
## The use of --keep-guessing eventually skips reporting duplicate passwords
##
This does not mean that valid passwords are skipped; they are always reported.
Only if you hit the same password twice for the same hash the password may be shown only once.
If --keep-guessing is not used, this can not occur.
This limitation cannot be fixed, because it would require too much device (GPU/CPU) memory.
If we wanted to report back all possible password candidates executed in a single kernel invocation, it would require this much memory:
Number-of-MCU * Max-threads-per-device * Max-accel * Max-inner-loops * sizeof (plain_t)
For example, on a Vega64: 64 * 512 * 1024 * 1024 * 20 = 687,194,767,360 bytes
##
## Hashcat GPU memory usage may be limited by maximum allocation sizes of OpenCL drivers
##
2018-11-01 19:17:02 +00:00
Most hashcat hash modes only use a single OpenCL allocation.
2017-12-04 09:51:49 +00:00
2018-11-01 19:17:02 +00:00
The size of this allocation is limited by GPU drivers / OpenCL runtimes.
2017-12-04 09:51:49 +00:00
Only a few modes (like scrypt) make more than one allocation.
##
## The maximum number of functions per rule is limited to 31
##
2018-11-01 19:17:02 +00:00
This makes the size of one rule 128 byte.
2017-12-04 09:51:49 +00:00
On the other hand, there is a 25% OpenCL single allocation memory limit.
A typical GPU of today has 8GB = 2GB/128 = 16M rules max
2018-11-01 19:17:02 +00:00
If hashcat supported more functions per rule, it would be limited to fewer rules.
2017-12-04 09:51:49 +00:00
This is a trade-off game.
##
## Position identifiers in rules are limited to 36
##
The upper limit of maximum 36 positions for various rule functions (0-9, A-Z) was a design decision by the original authors of the rule engine.