@ Gajan
I do following just to understand howto apply a rule, and found something strange
my paswsword is simple abcdwxyz when I use
./maskprocessor.exe -1 abcdwxyz ?1?1?1?1?1?1?1?1 | ./oclhashcat-plus64.exe -m 2500 -o D:\finished.txt D:\cap.hcccap,
I found it in 3s.
Whereas with best64.rule like
./maskprocessor.exe -1 abcdwxyz ?1?1?1?1?1?1?1?1 | ./oclhashcat-plus64.exe -m 2500 -r rules/best64.rule -o D:\finished.txt D:\cap.hcccap, it took 1min30 to catch the password.
When use specific rule it tooks over 4min30 TOXLC rule over 7min still no result etc.
So it seems with rule it performs "worse"! Why? Is somethingI do not correct?
My system is AMD X2 3.4GHz, ATI 6850, 59000 c/s )
@ gajan reg post #3
"Run the wordlist with these rules and the output will be all possible combinations of uppercased/lowercased alpha + digits & 6 characters of lenght (3 in the wordlist and another 3 added by the rule)."
Could you explain further. Do you mean the command to call is as follows:
./oclHashcat-plus64.bin --rules-file /home/king/ohcp/rules/add3.rule /home/king/ohcp/3-character-words.txt -o D:\finished.txt D:\cap.hcccap
the places with $ seem not to change at all. In my case I have generated file with
mp64.bin ?l ?1?1?1?1 > 4-character-words.txt; then run ultraedit, column mode, to place the $ as you shown (aaaa => a$a$a$a) and save it as add4.rule, it runs and runs over 1hr but can not find the password abcdwxyz! With pipe in method it tooks only 3s to catch it! It seems that the $s stay special $ and not change. I do not know for sure
BTW, Using oclhashcatplus64 is it possible to display which key/code is currently feeded-in the system, like I can see when running aircrack-ng
I do following just to understand howto apply a rule, and found something strange
my paswsword is simple abcdwxyz when I use
./maskprocessor.exe -1 abcdwxyz ?1?1?1?1?1?1?1?1 | ./oclhashcat-plus64.exe -m 2500 -o D:\finished.txt D:\cap.hcccap,
I found it in 3s.
Whereas with best64.rule like
./maskprocessor.exe -1 abcdwxyz ?1?1?1?1?1?1?1?1 | ./oclhashcat-plus64.exe -m 2500 -r rules/best64.rule -o D:\finished.txt D:\cap.hcccap, it took 1min30 to catch the password.
When use specific rule it tooks over 4min30 TOXLC rule over 7min still no result etc.
So it seems with rule it performs "worse"! Why? Is somethingI do not correct?
My system is AMD X2 3.4GHz, ATI 6850, 59000 c/s )
@ gajan reg post #3
"Run the wordlist with these rules and the output will be all possible combinations of uppercased/lowercased alpha + digits & 6 characters of lenght (3 in the wordlist and another 3 added by the rule)."
Could you explain further. Do you mean the command to call is as follows:
./oclHashcat-plus64.bin --rules-file /home/king/ohcp/rules/add3.rule /home/king/ohcp/3-character-words.txt -o D:\finished.txt D:\cap.hcccap
the places with $ seem not to change at all. In my case I have generated file with
mp64.bin ?l ?1?1?1?1 > 4-character-words.txt; then run ultraedit, column mode, to place the $ as you shown (aaaa => a$a$a$a) and save it as add4.rule, it runs and runs over 1hr but can not find the password abcdwxyz! With pipe in method it tooks only 3s to catch it! It seems that the $s stay special $ and not change. I do not know for sure
BTW, Using oclhashcatplus64 is it possible to display which key/code is currently feeded-in the system, like I can see when running aircrack-ng