Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Help splitting brute-force attack
Post: RE: Help splitting brute-force attack
epixoip Wrote: (05-14-2014, 08:46 PM)
--
This is covered in the release notes for 1.20. See the "Improved distributed cracking support" section of http://hashcat.net/forum/thread-3323.html
--
Than... |
|
ner0 |
Old oclHashcat Support
|
2 |
12,020 |
05-14-2014, 09:51 PM |
|
|
Thread: Help splitting brute-force attack
Post: Help splitting brute-force attack
Hi there.
I've read some topics and wiki references but I don't seem to be able to get this right. Let's assume I'm trying to crack an MD5 hash and it's password is comprised of 8 characters, for ex:... |
|
ner0 |
Old oclHashcat Support
|
2 |
12,020 |
05-14-2014, 08:23 PM |
|
|
Thread: Cracking salted md5
Post: RE: Cracking salted md5
undeath Wrote: (05-11-2014, 10:58 PM)
--
format is hash:salt
how the salt looks like doesn't matter
--
OK, thanks.
I was making a mistake in the command line, now it works, like this:
cudaHash... |
|
ner0 |
Old oclHashcat Support
|
2 |
27,275 |
05-11-2014, 11:03 PM |
|
|
Thread: Cracking salted md5
Post: Cracking salted md5
Hello there,
I'm trying to crack a salted md5 password, but I haven't been able to figure it out from the wiki or the command-line help. I wanted to ask you for some help on how to get started. Btw... |
|
ner0 |
Old oclHashcat Support
|
2 |
27,275 |
05-11-2014, 10:24 PM |