Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: md5(md5($pass))
Post: RE: md5(md5($pass))
|
krest |
Old oclHashcat Support
|
2 |
12,686 |
06-12-2015, 09:19 AM |
|
|
Thread: md5(md5($pass))
Post: md5(md5($pass))
Hey!
Is there any option in oclHashcat to crack md5(md5($pass)) hashes? |
|
krest |
Old oclHashcat Support
|
2 |
12,686 |
06-12-2015, 09:02 AM |
|
|
Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce
undeath Wrote: (05-25-2015, 03:37 PM)
--
the question mark has to be in front of the mask letter.
--
Oh, really! My bad.
Thanks much |
|
krest |
Old oclHashcat Support
|
12 |
43,547 |
05-25-2015, 03:41 PM |
|
|
Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce
rsberzerker Wrote: (02-05-2015, 03:12 PM)
--
I'm a little late, but instead of -i you could use a file with masks instead. For the example above of 1-7, create a file with the following lines:
?a
... |
|
krest |
Old oclHashcat Support
|
12 |
43,547 |
05-25-2015, 03:35 PM |
|
|
Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce
|
krest |
Old oclHashcat Support
|
12 |
43,547 |
02-05-2015, 02:36 PM |
|
|
Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce
undeath Wrote: (02-04-2015, 05:27 PM)
--
look again at post 2
--
is it correct now?
-m 0 -a 3 -o cracked.txt ?a -i |
|
krest |
Old oclHashcat Support
|
12 |
43,547 |
02-05-2015, 12:31 PM |
|
|
Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce
atom Wrote: (02-03-2015, 04:59 PM)
--
If you use oclHashcat, just use -i for increment
--
so correct command will look
Code:
--
-m 0 -a 3 -o cracked.txt -1 ?a -i
--
|
|
krest |
Old oclHashcat Support
|
12 |
43,547 |
02-04-2015, 03:14 PM |
|
|
Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce
forumhero Wrote: (02-02-2015, 06:16 PM)
--
yes but you need to add the ?a for each position of the password length. for example if you think the password is 6 characters then you need
?a?a?a?a?a?a
... |
|
krest |
Old oclHashcat Support
|
12 |
43,547 |
02-03-2015, 08:54 AM |
|
|
Thread: oclHashcat bruteforce
Post: oclHashcat bruteforce
Which options should I use to check all combinations of 1-3 symbol passwords during bruteforcing hashes?
I use -m 0 -a 3 -o cracked.txt -1 ?a |
|
krest |
Old oclHashcat Support
|
12 |
43,547 |
02-02-2015, 05:52 PM |