![]() |
Bruteforce + dictionary attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Bruteforce + dictionary attack (/thread-3892.html) |
Bruteforce + dictionary attack - turbohaje - 12-11-2014 How can I perform attack like this: 1-10 length bruteforce attack using charset: alphanum + . and prefix from a dictionary file? I tried reading --help but it's not very readable. RE: Bruteforce + dictionary attack - philsmd - 12-11-2014 you should be able to find the answer to your problem in the wiki https://hashcat.net/wiki/ RE: Bruteforce + dictionary attack - turbohaje - 12-11-2014 I have this, but it doesn't work: oclHashcat64.exe -m 0 -a 7 -o results.txt --outfile-format=3 -1 abcdefghijklmnopqrstuvwxyz0123456789._ ?1?1?1 prefixes.txt hashes.txt WARNING: Hash '?1?1?1': Line-length exception RE: Bruteforce + dictionary attack - turbohaje - 12-11-2014 Ok, I changed to: cudaHashcat64.exe -m 0 -a 7 -o results.txt --outfile-format=3 -1 abcdefghijklmnopqrstuvwxyz0123456789._ hashes.txt ?1?1?1 prefixes.txt and the error is diff, so I guess this thread can be closed |