oclHashcat-plus v0.06 - brute-force attack
#3
(10-27-2011, 09:26 AM)atom Wrote: its not a easy task so it will take some time. but you can already bruteforce md5crypt. take a looks at our wiki pages: http://hashcat.net/wiki/brute_force_in_oclhashcat_plus


I'm following the steps in the wiki but every time I try to run the bruteforce attack with the rule file I generated with maskprocessor I get Status: Exhausted 2 seconds into the attack.

[Image: MjBbi.png]

Or is bruteforcing WPA passwords still not ready yet? I guess I'll try to bruteforce an md5crypt to see if the problem persist.


Messages In This Thread
RE: oclHashcat-plus v0.06 - by atom - 10-27-2011, 09:26 AM
RE: oclHashcat-plus v0.06 - by Legitnick - 11-15-2011, 08:17 PM
RE: oclHashcat-plus v0.06 - by mastercracker - 11-15-2011, 10:12 PM
RE: oclHashcat-plus v0.06 - by Hash-IT - 11-15-2011, 10:43 PM
RE: oclHashcat-plus v0.06 - by Legitnick - 11-27-2011, 11:54 PM