hashcat Forum
Mask Attack Help / Brute Force Attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html)
+--- Thread: Mask Attack Help / Brute Force Attack (/thread-3341.html)



Mask Attack Help / Brute Force Attack - pacific - 05-02-2014

Hello everybody here is anybody who can correct me.
I m using The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-linux-1.0.6 and got MySQL Password Hashes.
So I need help in cracking them.
Here is what i done :
Code:
hashcat -m 300 -a 3 -1 ?a?a?a?a?a?a /root/Desktop/allhashes.txt mask

This code executes but not working.
My hashcat Version is 1.47


RE: Mask Attack Help / Brute Force Attack - Xanadrel - 05-02-2014

-1 is used to define a charset, not the mask itself
And replace "mask" in your command line with the actual mask, so :

Code:
hashcat -m 300 -a 3 /root/Desktop/allhashes.txt ?a?a?a?a?a?a