hcmask is not recognized in OSX - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: hcmask is not recognized in OSX (/thread-2993.html) |
hcmask is not recognized in OSX - matrik - 01-08-2014 Hi, On OSX, I am trying to use a maskfile (.hcmask) with hashcat-cli64.app as follows: Code: ./hashcat-cli64.app -m 0 1.hash -a 3 1.hcmask It seems "1.hcmask" file is not recognized as a file. Instead, it's recognized as a single mask and I get the following output: Code: Input.Mode: Mask (1) [1] From wiki, it seems possible to give a mask file to hashcat but is it really possible or am I doing something wrong? RE: hcmask is not recognized in OSX - philsmd - 01-08-2014 I double-checked the wiki page, http://hashcat.net/wiki/doku.php?id=mask_attack , says this: Code: Note: mask files are currently only supported by oclHashcat Is that the page you looked at (or do we need to update/improve other wiki pages)? The problem is that cpu hashcat currently does not support mask-files (hcmask)... If you insist to get this feature also for cpu hashcat you could try opening a trac ticket, https://hashcat.net/trac/ , and see if it'll get accepted. Another problem ofc is that you can't run oclHashcat on a MAC, therefore there are only some remaining options: 1. run the mask within a (shell) script - one mask at a time - several sequential calls of the .app 2. maybe you can use different hardware + win/linux with a recent GPU to run oclHashcat RE: hcmask is not recognized in OSX - matrik - 01-08-2014 Thank you for this answer. I first read http://hashcat.net/wiki/doku.php?id=hashcat which tells mask attack is possible on hashcat and then http://hashcat.net/wiki/doku.php?id=mask_attack which explains how to use mask files. It was my bad that I read these pages sequentially to believe mask files are supported by hashcat. I am trying to simplify and automate my onsite pentesting tools using mac, so I don't think this would be a meaningful functionality for everyone. I'll write a basic script to sequentially call the .app. |