![]() |
oclHashCat-plus64 MD5(unix) cracking help - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: oclHashCat-plus64 MD5(unix) cracking help (/thread-2276.html) Pages:
1
2
|
RE: oclHashCat-plus64 MD5(unix) cracking help - TrAnn3l - 05-01-2013 np, i you check the -h option of hashcat like cudaHashcat-plus64.exe -h you will get many useful information ![]() RE: oclHashCat-plus64 MD5(unix) cracking help - sangiiin - 05-01-2013 (05-01-2013, 06:52 PM)TrAnn3l Wrote: To crack all possible combinations just use: i tested your command now.. i md5ed "zar2Hh" and saved it into a file in /md5.txt and used your command : Code: ./cudaHashcat-plus64.bin -m 0 -a 3 -i --increment-max=7 -o /cr3.txt /md5.txt --force Code: . it must be cracked if your command is cheacking all combinations , yea ? is it possible to test all combinations `atom` ? ![]() RE: oclHashCat-plus64 MD5(unix) cracking help - TrAnn3l - 05-01-2013 I tried the same hash you had, didn't crack it too, but then i tried it with a other command. i cracked the hash, using Code: oclHashcat-plus64.exe -a 3 "hash.txt" ?a?a?a?a?a?a and using it with the mask ?a?a?a?a?a?a (a stands for ?l?u?d?s). i don't know why, but maybe Atom can us say what is here going on. RE: oclHashCat-plus64 MD5(unix) cracking help - epixoip - 05-01-2013 blind leading the blind. if you don't specify a mask in mask mode, it uses the default built-in mask, which is almost never what you want. if all you want to do is incrementally brute force all characters through length 7, you would simply use: Code: -a 3 -i ?a?a?a?a?a?a?a RE: oclHashCat-plus64 MD5(unix) cracking help - TrAnn3l - 05-01-2013 And what is the default built-in mask? RE: oclHashCat-plus64 MD5(unix) cracking help - epixoip - 05-01-2013 last, i knew, it was: -1 ae10i2onrls938t45m67cdyhubkgpjvfwzAxEILORNSMTCDBqHYKUPGJFVWZXQ -2 ae10i2onrls938t45m67cdyhubkgpjvfwzxq -3 ae10i2onrls938t45m67cdyhubkgpjvfwzx._q!-*@ -4 1029384567 ?1?2?2?2?2?2?2?3?3?3?3?4?4?4?4 but it may have changed RE: oclHashCat-plus64 MD5(unix) cracking help - sangiiin - 05-02-2013 (05-01-2013, 10:52 PM)epixoip Wrote: blind leading the blind. tnQ epixoip ... is it possible for my speed to crack this hash ? ![]() _________________________________________________________ for crack a 4lenght pass.. Code: ./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i --increment-min=1 --increment-max=12 --force RE: oclHashCat-plus64 MD5(unix) cracking help - mastercracker - 05-02-2013 The MD5 hash of "zar2Hh" should be cracked in a short time. For the MD5(unix), it will take much longer (and don't forget to use -m 500 instead of -m 0). It would be easier if you use an adapted mask like ?l?l?l?d?u?l. However in a real case scenario, you don't know that so you go for the highest probabilities, meaning that you start with first letter upper or lower case, followed by a bunch of lowercase letter and maybe finishing by 1-4 numbers. RE: oclHashCat-plus64 MD5(unix) cracking help - TrAnn3l - 05-02-2013 If you only want to crack one hash, you should use cudaHashcat-lite, that is much faster than normal cudaHashcat-plus, but you can only crack one hash at time. Also, if you want to crack a 4 length password, you don't need 12x ?a, you only need 4x ?a, and the increment things you typed are not really necessary. The command to brute-force a 4 length password should be Code: ./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a Code: ./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i RE: oclHashCat-plus64 MD5(unix) cracking help - sangiiin - 05-04-2013 can we use -m 500 in lite version ? cause i cant see 500 option in hash mode list in --help . anyway ... i understand , i cant crack it via one gpu because this md5 type give a heavy work to generate and check. so i must use multi gpus Or use good mask ![]() tanx from all for repling .. |