hashcat Forum
oclHashcat bruteforce - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: oclHashcat bruteforce (/thread-4040.html)

Pages: 1 2


oclHashcat bruteforce - krest - 02-02-2015

Which options should I use to check all combinations of 1-3 symbol passwords during bruteforcing hashes?
I use -m 0 -a 3 -o cracked.txt -1 ?a


RE: oclHashcat bruteforce - forumhero - 02-02-2015

yes but you need to add the ?a for each position of the password length. for example if you think the password is 6 characters then you need
?a?a?a?a?a?a

for 8 characters you want
?a?a?a?a?a?a?a?a

and so on.

you don't need the -1 unless you are using it as a variable, which looks like this
-1 ?l?u?d?s ?1?1?1?1?1?1

that does the same as the above ?a example.

more examples

http://hashcat.net/wiki/doku.php?id=mask_attack


RE: oclHashcat bruteforce - krest - 02-03-2015

(02-02-2015, 06:16 PM)forumhero Wrote: yes but you need to add the ?a for each position of the password length. for example if you think the password is 6 characters then you need
?a?a?a?a?a?a

for 8 characters you want
?a?a?a?a?a?a?a?a

and so on.

you don't need the -1 unless you are using it as a variable, which looks like this
-1 ?l?u?d?s ?1?1?1?1?1?1

that does the same as the above ?a example.

more examples

http://hashcat.net/wiki/doku.php?id=mask_attack

Thanks for the reply. Now I've understood about -1 usage.
But i still don't get how to brute all possible passwords if I do not know the length of a password. Lets say I want to start from 1 charachter passwords and go to 7 charachter passwords. Do I need to use some mask file or increment option?


RE: oclHashcat bruteforce - atom - 02-03-2015

If you use oclHashcat, just use -i for increment


RE: oclHashcat bruteforce - krest - 02-04-2015

(02-03-2015, 04:59 PM)atom Wrote: If you use oclHashcat, just use -i for increment

so correct command will look
Code:
-m 0 -a 3 -o cracked.txt -1 ?a -i



RE: oclHashcat bruteforce - undeath - 02-04-2015

look again at post 2


RE: oclHashcat bruteforce - krest - 02-05-2015

(02-04-2015, 05:27 PM)undeath Wrote: look again at post 2

is it correct now?
-m 0 -a 3 -o cracked.txt ?a -i


RE: oclHashcat bruteforce - azren - 02-05-2015

(02-05-2015, 12:31 PM)krest Wrote:
(02-04-2015, 05:27 PM)undeath Wrote: look again at post 2

is it correct now?
-m 0 -a 3 -o cracked.txt ?a -i

-m 0 -a 3 -o cracked.txt -i ?a?a?a?a?a?a?a

This will bruteforce from 1 character to 7 characters password.


RE: oclHashcat bruteforce - krest - 02-05-2015

thanks you all for help


RE: oclHashcat bruteforce - rsberzerker - 02-05-2015

I'm a little late, but instead of -i you could use a file with masks instead. For the example above of 1-7, create a file with the following lines:

?a
?a?a
?a?a?a
?a?a?a?a
?a?a?a?a?a
?a?a?a?a?a?a
?a?a?a?a?a?a?a

Give the file name instead of the mask. If the above file was named 7brute.hcmask, then the command line segment would be:

-m 0 -a 3 -o cracked.txt 7brute.hcmask

This method has an advantage over the -i in that you can add as many masks as you want, and hashcat/oclhashcat will go through each one without you have to reset for the next run. For instance, I would usually check 8-12 all digits afterwards (1-7 are already covered with ?a set), and maybe 8-9 all lowercase and 8-9 all uppercase. Just add the appropriate masks to the file before you start. You can't do that with -i.