hashcat Forum
Skipping Russian passwords in ver. 0.14 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html)
+--- Thread: Skipping Russian passwords in ver. 0.14 (/thread-2546.html)



Skipping Russian passwords in ver. 0.14 - Atlantis - 08-25-2013

For example, I have a wordlist of 3614 Russian words, their length is 1 to 5:

http://www.sendspace.com/file/i9snlt

I hash them into MD5 with the Passwordspro Hash Generator plugin, receive 3614 hashes:

http://www.sendspace.com/file/sbfmjx

If I try to crack them with the ?R?R?R?R?R mask,

[Image: d41c91215ff9.png]

only 990 of them are cracked.

[Image: b43100c03930.png]

BUT! If you point out all the Russian alphabete in a charset

[Image: 758c0c76776c.png]

and use the mask ?1?1?1?1?1 - voila! All 3614 hashes are cracked!

[Image: 1a9e96a824f5.png]

So, the question is - how does it come out and what symbols does the ?R mask use? 10x.

PS: The version 0.15 doesn't work with the ?R mask at all:

[Image: fe9740738acf.png]


RE: Skipping Russian passwords in ver. 0.14 - philsmd - 08-25-2013

Please use the features that v0.15 provide: e.g. see here http://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_charset_files

There are good reasons why "The version 0.15 doesn't work with the ?R mask at all" (answer, because you can define your own charsets in a hcchr file or use the russian charsets provided by hashcat).