(04-27-2015, 06:45 PM)Sozin Wrote: What methods you use?
Or you actually reverse engineer them?
We use a program that launches a dictionary / rule based / brute force attack.
The program is web based as well as a piece of software.
It downloads a piece of information from the web server & gives that to hashcat.
hashcat then starts to crack hashes using the GPU.
I'm offering you to help out this project by running this program to fetch data about the hashes from the server & then crack them
The data is sent back & that's it.
Example output of the PUBLIC statistics I'll have available soon for everyone.
including queue and so on. (THIS WILL BE LIVE (js))
If you're interested, send me a PM and I'll answer any other questions you might have as well as help you get it set up (which is super easy)
Statistics page added to the main thread