05-30-2014, 09:38 AM
Hey Globus,
The rule and the commandline you provided should crack the hash, yes. I tried to reproduce this with latest oclHashcat but can't. Maybe you use an older version? See my log:
The rule and the commandline you provided should crack the hash, yes. I tried to reproduce this with latest oclHashcat but can't. Maybe you use an older version? See my log:
Quote:root@sf:~/oclHashcat-1.22# echo PASSWOR > dict1
root@sf:~/oclHashcat-1.22# echo D123 > dict2
root@sf:~/oclHashcat-1.22# echo -n Password123 | iconv -t utf16le | openssl dgst -md4
(stdin)= 58a478135a93ac3bf058a5ea0e8fdb71
root@sf:~/oclHashcat-1.22# ./oclHashcat64.bin -d1 58a478135a93ac3bf058a5ea0e8fdb71 -m1000 -a1 dict1 dict2 -j "T1 T2 T3 T4 T5 T6" -k "T0" --weak-hash-threshold 0 --potfile-disable --quiet
58a478135a93ac3bf058a5ea0e8fdb71assword123