(05-16-2010, 12:00 PM)atom Wrote:(05-14-2010, 11:40 AM)vector Wrote: The result is no found passwords !? The same passwords but in MD5 are found ! What I do wrong ?
i dont see the problem. you are going to test only 129988 combinations, which requires less than a second. so you're just finished.
(05-14-2010, 11:40 AM)vector Wrote: And one more question - is there option for SIMPLE wordlist (dictionary) attack , NOT combined with any mask attack ?
for plain dictionary attack, use the cpu-based version: hashcat
Thank you for the answer !
OK finaly I found where I`m wrong
Can I request plain dictionary attack for oclHashcat I think this is extremely useful feature especially for the salted hashes ?