Mask Attack Help / Brute Force Attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: Mask Attack Help / Brute Force Attack (/thread-3341.html) |
Mask Attack Help / Brute Force Attack - pacific - 05-02-2014 Hello everybody here is anybody who can correct me. I m using The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-linux-1.0.6 and got MySQL Password Hashes. So I need help in cracking them. Here is what i done : Code: hashcat -m 300 -a 3 -1 ?a?a?a?a?a?a /root/Desktop/allhashes.txt mask This code executes but not working. My hashcat Version is 1.47 RE: Mask Attack Help / Brute Force Attack - Xanadrel - 05-02-2014 -1 is used to define a charset, not the mask itself And replace "mask" in your command line with the actual mask, so : Code: hashcat -m 300 -a 3 /root/Desktop/allhashes.txt ?a?a?a?a?a?a |