03-30-2015, 04:57 PM
(08-07-2014, 05:56 PM)mblanke Wrote:(08-07-2014, 05:11 PM)philsmd Wrote: Why do you use -t 32 ? Do you know what that command line option means?
Also, the generated hashes must correspond to plains of length 7 (exactly).
the -i (or --increment*) doesn't hurt, but is useless in that specific command, since min and max are identical
I don't know what the -t is, I copied it from another example. As for the increment if I know the min and max length wouldn't it shorten the processing time? Regardless of my lack of expertise with the tool, can you provide any constructive advise as to why the hashes aren't found?
Example:
Password:HiKoTeE
NTML Hash:
5C55443CE5EA9FFF6372DB5FD1EBBE6D
Quote:i see 3 problems with your command line, as "philsmd" mentioned the -t is not needed nor is --increment-max as "?a?a?a?a?a?a?a" will define your maximum and also the "-o" command is for a different attack mode -a 1 not -a 3 for a mask attack try this command
cudaHashcat64.exe -m 1000 -a 3 ntlm.hash ?a?a?a?a?a?a?a -i --increment-min=7 --session=ntlm
cracked hashes will appear in the hashcat terminal/cmd once cracked
with the above command you can also quit the attack and resume it later with this command
cudaHashcat64.exe --session=ntlm --restore
for a full list of command options type
cudaHashcat64.exe --help
and make sure you got the right hash type selected (-m)
good luck and have fun ;P