11-05-2015, 12:32 PM
(This post was last modified: 11-05-2015, 12:32 PM by mastercracker.)
Well, you have not searched at the right place, it seems. The answer is right there in the FAQ section of the wiki:
Code:
How does one use the new prince attack mode with hashcat?
Luckily, with latest version of hashcat CPU the attack-mode is built-in. You can simply use it using the -a 8 selection. Do not forget to name a wordlist, like rockyou.txt or so.
For oclHashcat you need to use a pipe and the princeprocessor (standalone binary) from here:
https://github.com/jsteube/princeprocessor/releases
Then your simply pipe like this for slow hashes:
$ ./pp64.bin rockyou.txt | ./oclHashcat64.bin -m 2500 -w 3 test.hccap
In case you want to crack fast hashes you need to add an amplifier to archieve full speed:
$ ./pp64.bin rockyou.txt | ./oclHashcat64.bin -m 0 -w 3 test.md5 -r rules/rockyou-30000.rule