modified-batchcrack.sh - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: modified-batchcrack.sh (/thread-2305.html) |
modified-batchcrack.sh - operat0r - 05-19-2013 same as the batchcrack.sh but I added rules option and all wordlist in the folder instead of just two. I found out today that my rules were not even running right so it all works now in cygwin .. http://rmccurdy.com/scripts/batchcrack_rmccurdy.sh http://rmccurdy.com/scripts/fu.txt for examples/help Here some things/Ideas i want to add: * auto bin or exe path detect 32 or 64 in windows and *nix auto detect CUDA or OPENCL * maybe some kind of benchmark test to auto set what rules/wordlist it uses based on hashtype selected and benchmark results ( basically autopwn for OCLhashcat ) maybe set a max time to crack * import AD password policy tool and automagicly find/remove/use rules based on the AD password policy anyway im off to bed.. my poor pile of crap video card... thanks all Code: Session.Name...: cudaHashcat-plus OWNED! 7 char password caps and special chars and a number It’s a 1337 speak password. I see 1337 speak quite often ...almost all the time RE: modified-batchcrack.sh - alezy - 01-15-2014 I have been experimenting with using freeradius-wpe to collect credentials from WPA enterprise wireless set ups. RE: modified-batchcrack.sh - alezy - 01-15-2014 see that post |