I am using rcracki_mt 0.6.3 on Debian Linux. I am using the lm_all-space#1-7_0_10000x67108864 tables from the freerainbowtables mirror. When cracking this hash:
the Unicode correction never stops, and seems to go beyond the number of characters in the password. Also the Mhashes/s value is observed to go negative sometimes. The correction has to be skipped manually for rcracki_mt to continue. See attached debug log.
Log in to post a comment.