11-06-2015, 03:53 PM
(11-05-2015, 12:32 PM)mastercracker Wrote: Well, you have not searched at the right place, it seems. The answer is right there in the FAQ section of the wiki:
Code:How does one use the new prince attack mode with hashcat?
Luckily, with latest version of hashcat CPU the attack-mode is built-in. You can simply use it using the -a 8 selection. Do not forget to name a wordlist, like rockyou.txt or so.
For oclHashcat you need to use a pipe and the princeprocessor (standalone binary) from here:
https://github.com/jsteube/princeprocessor/releases
Then your simply pipe like this for slow hashes:
$ ./pp64.bin rockyou.txt | ./oclHashcat64.bin -m 2500 -w 3 test.hccap
In case you want to crack fast hashes you need to add an amplifier to archieve full speed:
$ ./pp64.bin rockyou.txt | ./oclHashcat64.bin -m 0 -w 3 test.md5 -r rules/rockyou-30000.rule
Thanks MasterCracker.
I did see that after I posted, however thought there might me other settings/switches/options that need to be specified in the command chain. I'll try it again and see what happens. Thank you for responding.
/r
J