Hi,
If you type ./hascat-clixx.bin ( or .exe / or oclhashcat-plus ) --help
you going to have all the avaible syntax code to be used with hashcat.
In your case & for : md5($salt.$pass) is : 20
So in the case of an Straight attack = ./hashcat-clixx.bin ( or exe or.....) -m 20 -a 0 hashe.txt -o out.txt dic.txt
-m = hashes type
-a = Attack mode
-o = output file
Regards,
Tony
If you type ./hascat-clixx.bin ( or .exe / or oclhashcat-plus ) --help
you going to have all the avaible syntax code to be used with hashcat.
In your case & for : md5($salt.$pass) is : 20
So in the case of an Straight attack = ./hashcat-clixx.bin ( or exe or.....) -m 20 -a 0 hashe.txt -o out.txt dic.txt
-m = hashes type
-a = Attack mode
-o = output file
Regards,
Tony