hashcat Forum
Optimize MD5 brute force attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html)
+--- Thread: Optimize MD5 brute force attack (/thread-765.html)



Optimize MD5 brute force attack - arex1337 - 12-31-2011

I've been using this command, but is it inefficient? This wiki article is the reason I'm asking... Do I need to use mp64 to optimize my attack?

oclHashcat-plus64.exe -a 3 -o C:\gpu-len7.log C:\md5.tab -1 ?l?u?d ?1?1?1?1?1?1?1


RE: Optimize MD5 brute force attack - radix - 01-01-2012

If you are using -plus 0.07 you will not need to use maskprocessor since the capability is now built in.


RE: Optimize MD5 brute force attack - shapleigh - 01-02-2012

ERROR: ?1?1?1?1?1?1: No such file or directory
or
ERROR: ?d?d?d?d?d: No such file or directory

>cudaHashcat-plus64 --gpu-async --gpu-
loops=256 --gpu-watchdog=105 -m 0 .\540hashes.txt ?d?d?d?d?
d ?d?d?d?d -o E:\finishednow.txt

I'm using the same command structure as I did with cudaHashcat64, but, it will not process. I can use mp64, but that limits the speed to what one core of my cpu will output (I could very well be wrong about this, I am an n00b).. I would also like to recomend a non/later dated copy of ocl/cuda hashcat for the time being for algo's such as sha1($salt.$pass) that are not implemented into -plus as of yet.
thanks again for the great tool, and your time listening to n00bs like me Big Grin


RE: Optimize MD5 brute force attack - atom - 01-02-2012

with new plus version you have to specify what type of attack you are doing. from your commandline i can see you want to do brute-force, so you have to add -a 3 to cmdline. also you dont need to split the mask. the correct cmdline looks like:


cudaHashcat-plus64 -a 3 --gpu-async --gpu-loops 256 --gpu-watchdog 105 -m 0 .\540hashes.txt ?d?d?d?d?d?d?d?d?d -o E:\finishednow.txt