02-11-2012, 04:50 PM
Not wanting to start a new post on a similar subject, so hope OK to 'hijack' this one..
I am somewhat confused with the bruteforce options with regards to increasing in increments.
On the WIKI it is mentioned that the bruteforce attack is supported by oclHashcat+ however I am having
real trouble getting it to work.
Now I can use a bruteforce with a fixed number of characters (for a 9 digit numeric pass for the below
examples for instance) ;
I can also use maskprocessor to pipe it into hashcat with increments, which I believe done as herebelow for passes from 8 - 10 digits;
So what I am not clear on is the WIKI mention of using the --bf-pw-min & --bf-pw-max switches for
bruteforce attacks.
Could anyone be so kind as to give an oclHashcat+ example on using these switches ?
--bf-pw-min=8 --bf-pw-max=10 --bf-cs-buf=0123456789
Any guidance greatly appreciated !
I am somewhat confused with the bruteforce options with regards to increasing in increments.
On the WIKI it is mentioned that the bruteforce attack is supported by oclHashcat+ however I am having
real trouble getting it to work.
Now I can use a bruteforce with a fixed number of characters (for a 9 digit numeric pass for the below
examples for instance) ;
Code:
cudaHashcat-plus64.exe -m 2500 -a 3 capture.hccap ?d?d?d?d?d?d?d?d?d
I can also use maskprocessor to pipe it into hashcat with increments, which I believe done as herebelow for passes from 8 - 10 digits;
Code:
mp64.exe -i --increment-min=8 --increment-max=10 ?d?d?d?d?d?d?d?d?d?d | cudaHashcat-plus64.exe -m 2500 capture.hccap
So what I am not clear on is the WIKI mention of using the --bf-pw-min & --bf-pw-max switches for
bruteforce attacks.
Could anyone be so kind as to give an oclHashcat+ example on using these switches ?
--bf-pw-min=8 --bf-pw-max=10 --bf-cs-buf=0123456789
Any guidance greatly appreciated !