How to use gpu on bruteforcing SHA256(MD5('password')) - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: How to use gpu on bruteforcing SHA256(MD5('password')) (/thread-8483.html) |
How to use gpu on bruteforcing SHA256(MD5('password')) - Vido - 07-12-2019 Hi guys, I want to bruteforce hash on my gpu SHA256(MD5('password')) but cant find right number for it. 4700 is closest but does not match what I wont. I tried this command Code: $ ./hashcat64.bin -a 3 -m 4700 -o cracked.txt -n 1 --increment-min=2 --increment-max=15 --bf-cs-buf=0123456789 hash.txt -D 1,2 but it giving me an error Code: ./hashcat64.bin: unrecognized option '--bf-cs-buf=0123456789' Can anyone put me on right direction RE: How to use gpu on bruteforcing SHA256(MD5('password')) - philsmd - 07-13-2019 see the output of --help sha256(md5(pass)) is not currently supported -a 3 needs a mask and you specify a mask directly after the hash file e.g. Code: ./hashcat64.bin -a 3 -m 4700 -D 1,2 -o cracked.txt --increment --increment-min 2 hash.txt ?d?d?d?d?d?d?d?d?d?d I don't know why you use this "bf-cs-buf", it was never an option available for the modern hashcat binary (again see --help). Where is the hashing algorithm sha256(md5(pass)) used ? is this a common software/cms etc ? RE: How to use gpu on bruteforcing SHA256(MD5('password')) - Vido - 07-13-2019 (07-13-2019, 08:18 AM)philsmd Wrote: see the output of --help Ok great tnx for explanation.Sha256(md5(pass)) Its used on huawei router backup confing file, Edit: How can I pipe md5 output from one hashcut to another which will do sha256 ? RE: How to use gpu on bruteforcing SHA256(MD5('password')) - philsmd - 07-13-2019 Code: perl tools/test.pl passthrough 0 < example.dict | hashcat -m 1400 -w 3 hash.txt RE: How to use gpu on bruteforcing SHA256(MD5('password')) - Vido - 07-13-2019 (07-13-2019, 12:22 PM)philsmd Wrote: But I dont have test.pl what is insede of it ? Tnx Edit: I would like to use crunch as dict. ? RE: How to use gpu on bruteforcing SHA256(MD5('password')) - undeath - 07-13-2019 https://github.com/hashcat/hashcat/blob/master/tools/test.pl you can also do Code: crunch [options] | perl tools/test.pl passthrough 0 | hashcat -m 1400 -w 3 hash.txt RE: How to use gpu on bruteforcing SHA256(MD5('password')) - Vido - 07-13-2019 (07-13-2019, 12:34 PM)undeath Wrote: https://github.com/hashcat/hashcat/blob/master/tools/test.pl Can't open perl script "tools/test.pl": No such file or directory RE: How to use gpu on bruteforcing SHA256(MD5('password')) - Vido - 07-13-2019 My bad its in git version tnx RE: How to use gpu on bruteforcing SHA256(MD5('password')) - Vido - 07-13-2019 When I run attack hashcat just exit Code: $ crunch 2 10 abcdefghijklamnoprts | perl tools/test.pl passthrough 0 | hashcat -m 1400 -w 3 hash.txt RE: How to use gpu on bruteforcing SHA256(MD5('password')) - philsmd - 07-13-2019 c'mon this should be really obvious. The error message says that you do not have the required perl modules installed This thread is getting a little bit weird (the strange command line options, the usage of crunch if you could do the same thing with hashcat --stdout or much faster with just maskprocessor and blaming hashcat for the failure of installing the required perl modules etc) |