(10-05-2011, 06:41 PM)mormaii2 Wrote: Hey guys, i'd like to know how can i bruteforce using oclHashcat plus since i've already tried using a dictionary which is 5GB (30.000.000.000 words) and i only cracked 2 out of 7 hashes.There was already a topic about that. I'll write it up again.
i've been using this syntax
cudaHashcat-64.exe -m 15 -o D:\finished.txt -r rules/best64.rule D:\hashlist.txt D:\dictionary.txt
So seeing as cracking with dictionary didn't work i'd like to know how to do it with bruteforce. Thank you!
You can pipe the maskprocessor's output to oclhashcat-plus.
E.G.:
Code:
mp64.exe -1 ?l?u?d?s ?1?1?1?1?1 | ./oclhashcat-plus64.exe -m 15 -o D:\finished.txt -r rules/best64.rule D:\hashlist.txt
Code:
mp64.exe -1 ?l?u ?1?d?d?d?d | ./oclhashcat-plus64.exe -m 15 -o D:\finished.txt D:\hashlist.txt
You can find MaskProcessor here: http://hashcat.net/files/maskprocessor-0.65.7z
That beeing said, I suggest NOT to bruteforce salted hashes. Especially when there is many of them. In your case i understand you have 5 hashes left : It is still a bad idea to bruteforce those but it is up to you.
one more thing: there's no point having a 5Gb dictionary full of crap(*)... You better use more (or differents) rules. best64.rule is good for a quick run and slow algos such as FreeBSD MD5, etc.
For example: the new T0XlC.rule set is really cool, try it on rockyou.txt or any other good dictionaries.