03-14-2013, 11:55 PM
(03-13-2013, 05:16 AM)Convex Wrote:(03-11-2013, 11:24 PM)mykulh Wrote:Oh my god! Thank you so much man! But how do I change what mode to run it in?(03-11-2013, 09:59 PM)vizzdoom Wrote:Code:vizzdoom@viMac:~/Pentest/hashcat/hashcat-0.43$ ls
docs hashcat-cli32.bin hashcat-cli64.app hashcat-cli64.exe hashcat-cliAVX.exe hashcat-cliXOP.exe salts
examples hashcat-cli32.exe hashcat-cli64.bin hashcat-cliAVX.bin hashcat-cliXOP.bin rules tables
vizzdoom@viMac:~/Pentest/hashcat/hashcat-0.43$ ./hashcat-cli64.app --help
hashcat, advanced password recovery
Usage: hashcat [options] hashfile [mask|wordfiles|directories]
So now try this from within the Hashcat-43 folder:
./hashcat-cli64.app examples/A0.M0.hash /Users/XXXXXX/Desktop/Wordlist.dict
Where /Users/XXXXXX/Desktop/Wordlist.dict is the path to your dictionary file.
To change the hash to SHA1, for example
./hashcat-cli64.app examples/A0.M100.hash -m 100 /Users/XXXXXX/Desktop/Wordlist.dict
To change the attack type to brute force a SHA1 hash, for example
./hashcat-cli64.app examples/A0.M100.hash -m 100 -a 3 -1 ?a?a?a?a?a?a (for six characters using upper/lower/num/special)