05-14-2014, 06:48 PM
If you have an Idea how the password could look like and you can not create the candidates with one of the builtin attack-modes I recommend writing your own password candidate generator and simply pipe it to oclHashcat.
./mycandidategenerator dict1 dict2 dict3 ... dict40 | ./oclHashcat64.bin -m 6231 bla.tc ...
./mycandidategenerator dict1 dict2 dict3 ... dict40 | ./oclHashcat64.bin -m 6231 bla.tc ...