Assuming that it's this type of hash:
... then you need to specify the hash type (-m 500 = Cisco-IOS MD5) and the attack type (-a 3 = brute-force), as in:
If you know anything about what the password might contain (character sets and/or position), that's when you use a mask.
Edit to add: It also sounds like you might want to look into using some word lists, instead of rainbow tables.
Code:
$ openssl passwd -1 -salt 0000 -table password
password $1$0000$aWwcZQIpZ/gD70N/fOUeh0
... then you need to specify the hash type (-m 500 = Cisco-IOS MD5) and the attack type (-a 3 = brute-force), as in:
Code:
./cudaHashcat64.bin -a 3 -m 500 '$1$0000$aWwcZQIpZ/gD70N/fOUeh0'
If you know anything about what the password might contain (character sets and/or position), that's when you use a mask.
Edit to add: It also sounds like you might want to look into using some word lists, instead of rainbow tables.
~