Thread Rating:
  • 1 Votes - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Optimize MD5 brute force attack
12-31-2011, 11:16 PM (This post was last modified: 01-01-2012 02:58 AM by arex1337.)
Post: #1
Optimize MD5 brute force attack
I've been using this command, but is it inefficient? This wiki article is the reason I'm asking... Do I need to use mp64 to optimize my attack?

oclHashcat-plus64.exe -a 3 -o C:\gpu-len7.log C:\md5.tab -1 ?l?u?d ?1?1?1?1?1?1?1
Find all posts by this user
01-01-2012, 07:51 AM
Post: #2
RE: Optimize MD5 brute force attack
If you are using -plus 0.07 you will not need to use maskprocessor since the capability is now built in.
Find all posts by this user
01-02-2012, 03:16 AM
Post: #3
RE: Optimize MD5 brute force attack
ERROR: ?1?1?1?1?1?1: No such file or directory
or
ERROR: ?d?d?d?d?d: No such file or directory

>cudaHashcat-plus64 --gpu-async --gpu-
loops=256 --gpu-watchdog=105 -m 0 .\540hashes.txt ?d?d?d?d?
d ?d?d?d?d -o E:\finishednow.txt

I'm using the same command structure as I did with cudaHashcat64, but, it will not process. I can use mp64, but that limits the speed to what one core of my cpu will output (I could very well be wrong about this, I am an n00b).. I would also like to recomend a non/later dated copy of ocl/cuda hashcat for the time being for algo's such as sha1($salt.$pass) that are not implemented into -plus as of yet.
thanks again for the great tool, and your time listening to n00bs like me Big Grin
Find all posts by this user
01-02-2012, 11:14 AM
Post: #4
RE: Optimize MD5 brute force attack
with new plus version you have to specify what type of attack you are doing. from your commandline i can see you want to do brute-force, so you have to add -a 3 to cmdline. also you dont need to split the mask. the correct cmdline looks like:


cudaHashcat-plus64 -a 3 --gpu-async --gpu-loops 256 --gpu-watchdog 105 -m 0 .\540hashes.txt ?d?d?d?d?d?d?d?d?d -o E:\finishednow.txt
Visit this user's website Find all posts by this user