Using Prince Attack with pdf hashes
#3
(11-05-2015, 12:32 PM)mastercracker Wrote: Well, you have not searched at the right place, it seems.  The answer is right there in the FAQ section of the wiki:

Code:
How does one use the new prince attack mode with hashcat?

Luckily, with latest version of hashcat CPU the attack-mode is built-in. You can simply use it using the -a 8 selection. Do not forget to name a wordlist, like rockyou.txt or so.

For oclHashcat you need to use a pipe and the princeprocessor (standalone binary) from here:

https://github.com/jsteube/princeprocessor/releases

Then your simply pipe like this for slow hashes:

$ ./pp64.bin rockyou.txt | ./oclHashcat64.bin -m 2500 -w 3 test.hccap

In case you want to crack fast hashes you need to add an amplifier to archieve full speed:

$ ./pp64.bin rockyou.txt | ./oclHashcat64.bin -m 0 -w 3 test.md5 -r rules/rockyou-30000.rule

Thanks MasterCracker.  

I did see that after I posted, however thought there might me other settings/switches/options that need to be specified in the command chain.  I'll try it again and see what happens.  Thank you for responding.
/r
J


Messages In This Thread
Using Prince Attack with pdf hashes - by Jiminy - 11-03-2015, 11:45 PM
RE: Using Prince Attack with pdf hashes - by Jiminy - 11-06-2015, 03:53 PM