Skipping Russian passwords in ver. 0.14 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: Skipping Russian passwords in ver. 0.14 (/thread-2546.html) |
Skipping Russian passwords in ver. 0.14 - Atlantis - 08-25-2013 For example, I have a wordlist of 3614 Russian words, their length is 1 to 5: http://www.sendspace.com/file/i9snlt I hash them into MD5 with the Passwordspro Hash Generator plugin, receive 3614 hashes: http://www.sendspace.com/file/sbfmjx If I try to crack them with the ?R?R?R?R?R mask, only 990 of them are cracked. BUT! If you point out all the Russian alphabete in a charset and use the mask ?1?1?1?1?1 - voila! All 3614 hashes are cracked! So, the question is - how does it come out and what symbols does the ?R mask use? 10x. PS: The version 0.15 doesn't work with the ?R mask at all: RE: Skipping Russian passwords in ver. 0.14 - philsmd - 08-25-2013 Please use the features that v0.15 provide: e.g. see here http://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_charset_files There are good reasons why "The version 0.15 doesn't work with the ?R mask at all" (answer, because you can define your own charsets in a hcchr file or use the russian charsets provided by hashcat). |