11-30-2015, 12:40 PM
The usage of the command line is like so (as given in the wiki https://hashcat.net/wiki/doku.php?id=oclhashcat):
oclHashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...
So it seems to me in your command that you're calling for a MSSQL2012/14 crack, using a brute force (mask) attack method, outputting the cracked hash into "C:\Data\pw.txt", and then giving it your hash to crack.
As you can see, comparing it to the usage template above, you have specified options as well as the hash itself, but haven't provided a dictionary/mask. Since you want to use the mask method, you need to specify a mask. More details are given in the wiki, as with all other information. https://hashcat.net/wiki/doku.php?id=mask_attack
As you can see, most of the information you're looking for is readily available around here, so please take some time to look through it yourself and get familiar with the proper usage of the commands. This forum isn't a tutorial for the basics of hashcat, those exist elsewhere already.
oclHashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...
So it seems to me in your command that you're calling for a MSSQL2012/14 crack, using a brute force (mask) attack method, outputting the cracked hash into "C:\Data\pw.txt", and then giving it your hash to crack.
As you can see, comparing it to the usage template above, you have specified options as well as the hash itself, but haven't provided a dictionary/mask. Since you want to use the mask method, you need to specify a mask. More details are given in the wiki, as with all other information. https://hashcat.net/wiki/doku.php?id=mask_attack
As you can see, most of the information you're looking for is readily available around here, so please take some time to look through it yourself and get familiar with the proper usage of the commands. This forum isn't a tutorial for the basics of hashcat, those exist elsewhere already.