Hybrid attack query
#1
Hi

I running 4 x AMD r9 280, i7 3.7Ghz, windows 7 (couldn't get ubuntu to install with the UEFI board/bios)

I know the Passwords start with days of the week and end in numbers like years etc , so I created a dictionary to recover the easy DES hashes

Monday
Monda
Mond
Mon
Tuesday
Tuesda
.
.
.
Friday
Frida
etc etc

I also added lowercase starts for the days.

I then ran a hybrid attack -

oclhashcat64.exe -a 6 -m 1500 --remove --session=rob --gpu-temp-abort=95 --outfile-format=3 --outfile=recovered.txt e:\hashes f:\wordlist ?d

I ran the same command using ?d?d and ?d?d?d and ?d?d?d?d and finally ?d?d?d?d?d

It did recover some hashes.

Later I ran a brute force attack using the below after applying many more mask combinations and other dictionaries -

oclhashcat64.exe -a 3 -m 1500 -1 ?u?l -2 ?l?d --remove --session=rob --gpu-temp-abort=95 --outfile-format=3 --outfile=recovered.txt e:\hashes ?1?2?2?2?2?2?2

It then recovered passwords like Monday1, Fri2003 etc

I would have expected to have recovered these from the hybrid attack?

comments please

Rob


Messages In This Thread
Hybrid attack query - by robertf - 03-31-2015, 01:36 PM
RE: Hybrid attack query - by kartan - 03-31-2015, 08:55 PM
RE: Hybrid attack query - by robertf - 04-01-2015, 09:39 AM
RE: Hybrid attack query - by kartan - 04-01-2015, 11:11 AM