Cracking Russian Passwords
#9
Code:
hc64p ..\M\MD5.hash ..\M\Odic.dic -o..\M\OUT.out

cudaHashcat-plus v5.36 by atom starting...

Hashes: 1
Unique digests: 1
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rules: 1
GPU-Loops: 128
GPU-Accel: 8
Password lengths range: 1 - 15
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 70c

Scanned dictionary ..\M\Odic.dic: 12 bytes, 1 words, 1 keyspace, starting attack...


Status.......: Cracked
Input.Mode...: File (..\M\Odic.dic)
Hash.Target..: 507620db658a3d55c367cc8273e2ee24
Hash.Type....: MD5
Time.Running.: 0 secs
Time.Util....: 999.5ms/0.0ms Real/CPU, 0.0% idle
Speed........:        1 c/s Real,        0 c/s GPU
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 1/1 (100.00%)
Rejected.....: 0/1 (0.00%)
HWMon.GPU.#1.:  0% Util, 39c Temp, -1rpm Fan

Started: Sat May 26 06:33:44 2012
Stopped: Sat May 26 06:33:46 2012

I believe your problem is with the encoding. It has to be No BOM.
I use Windows too.
Use this dictionary, it should work: HERE



PS: cudaHashcat-plus v5.36 FTW!
xD


Messages In This Thread
Cracking Russian Passwords - by NeonFlash - 05-23-2012, 08:31 PM
RE: Cracking Russian Passwords - by M@LIK - 05-23-2012, 08:37 PM
RE: Cracking Russian Passwords - by phillips321 - 05-23-2012, 10:14 PM
RE: Cracking Russian Passwords - by undeath - 05-24-2012, 12:57 AM
RE: Cracking Russian Passwords - by NeonFlash - 05-24-2012, 04:33 AM
RE: Cracking Russian Passwords - by NeonFlash - 05-25-2012, 08:37 PM
RE: Cracking Russian Passwords - by M@LIK - 05-25-2012, 09:47 PM
RE: Cracking Russian Passwords - by NeonFlash - 05-26-2012, 05:21 AM
RE: Cracking Russian Passwords - by M@LIK - 05-26-2012, 05:42 AM
RE: Cracking Russian Passwords - by NeonFlash - 05-26-2012, 06:16 AM
RE: Cracking Russian Passwords - by M@LIK - 05-26-2012, 06:26 AM
RE: Cracking Russian Passwords - by NeonFlash - 05-26-2012, 08:58 AM