Optimize MD5 brute force attack - Printable Version
+- hashcat Forum (http://hashcat.net/forum)
+-- Forum: Support (/forum-3.html)
+--- Forum: oclHashcat-plus (/forum-23.html)
+--- Thread: Optimize MD5 brute force attack (/thread-765.html)
Optimize MD5 brute force attack - arex1337 - 12-31-2011 11:16 PM
I've been using this command, but is it inefficient? This wiki article is the reason I'm asking... Do I need to use mp64 to optimize my attack?
oclHashcat-plus64.exe -a 3 -o C:\gpu-len7.log C:\md5.tab -1 ?l?u?d ?1?1?1?1?1?1?1
RE: Optimize MD5 brute force attack - radix - 01-01-2012 07:51 AM
If you are using -plus 0.07 you will not need to use maskprocessor since the capability is now built in.
RE: Optimize MD5 brute force attack - shapleigh - 01-02-2012 03:16 AM
ERROR: ?1?1?1?1?1?1: No such file or directory
ERROR: ?d?d?d?d?d: No such file or directory
>cudaHashcat-plus64 --gpu-async --gpu-
loops=256 --gpu-watchdog=105 -m 0 .\540hashes.txt ?d?d?d?d?
d ?d?d?d?d -o E:\finishednow.txt
I'm using the same command structure as I did with cudaHashcat64, but, it will not process. I can use mp64, but that limits the speed to what one core of my cpu will output (I could very well be wrong about this, I am an n00b).. I would also like to recomend a non/later dated copy of ocl/cuda hashcat for the time being for algo's such as sha1($salt.$pass) that are not implemented into -plus as of yet.
thanks again for the great tool, and your time listening to n00bs like me
RE: Optimize MD5 brute force attack - atom - 01-02-2012 11:14 AM
with new plus version you have to specify what type of attack you are doing. from your commandline i can see you want to do brute-force, so you have to add -a 3 to cmdline. also you dont need to split the mask. the correct cmdline looks like:
cudaHashcat-plus64 -a 3 --gpu-async --gpu-loops 256 --gpu-watchdog 105 -m 0 .\540hashes.txt ?d?d?d?d?d?d?d?d?d -o E:\finishednow.txt