Brute Force / Mask - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: Brute Force / Mask (/thread-2297.html) |
Brute Force / Mask - Jack - 05-15-2013 How do I go about performing a brute / mask attack on a vbulletin hash with one thread that and it tries every password that is from 5 characters to 10 characters long and uses numbers, letters and symbols ? RE: Brute Force / Mask - Kuci - 05-15-2013 Hmm, what about reading help and wiki ? RE: Brute Force / Mask - Jack - 05-15-2013 I did but I don't know If im doing the right thing or not. is this right? Code: hashcat-cli64.exe -a 3 --pw-min=5 --pw-max=10 -m 2711 -n 2 -c 64 hash.txt -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1 RE: Brute Force / Mask - Kuci - 05-15-2013 Yes, you do. RE: Brute Force / Mask - epixoip - 05-16-2013 first, you're not going to brute force past length 8 on CPU. you probably won't even get past length 7. second, you don't need to specify --pw-max third, -c with -a 3 does nothing forth, you can replace "-1 ?l?u?d?s ?1" with "?a" so while your command line works, a more appropriate command line would be: Code: hashcat-cli64 -n 2 -m 2711 -a 3 --pw-min 5 hash.txt ?a?a?a?a?a?a?a RE: Brute Force / Mask - Jack - 05-16-2013 (05-15-2013, 05:22 PM)Kuci Wrote: Hmm, what about reading help and wiki ? (05-16-2013, 02:20 AM)epixoip Wrote: first, you're not going to brute force past length 8 on CPU. you probably won't even get past length 7.Thanks, does this make it more likely to get the password? RE: Brute Force / Mask - mastercracker - 05-16-2013 Quote:Thanks, does this make it more likely to get the password?Not at all. If the password is length 8 or more, you won't get it but if it's less than 8, you should crack it if it does not contain regional characters. |