Cisco IOS MD5 BruteForce Mask
#3
Assuming that it's this type of hash:

Code:
$ openssl passwd -1 -salt 0000 -table password
password    $1$0000$aWwcZQIpZ/gD70N/fOUeh0

... then you need to specify the hash type (-m 500 = Cisco-IOS MD5) and the attack type (-a 3 = brute-force), as in:

Code:
./cudaHashcat64.bin -a 3 -m 500 '$1$0000$aWwcZQIpZ/gD70N/fOUeh0'

If you know anything about what the password might contain (character sets and/or position), that's when you use a mask.

Edit to add: It also sounds like you might want to look into using some word lists, instead of rainbow tables.
~


Messages In This Thread
Cisco IOS MD5 BruteForce Mask - by d@rsh - 04-14-2015, 04:40 PM
RE: Cisco IOS MD5 BruteForce Mask - by undeath - 04-14-2015, 05:05 PM
RE: Cisco IOS MD5 BruteForce Mask - by royce - 04-14-2015, 05:32 PM
RE: Cisco IOS MD5 BruteForce Mask - by d@rsh - 04-14-2015, 06:05 PM
RE: Cisco IOS MD5 BruteForce Mask - by royce - 04-14-2015, 08:44 PM
RE: Cisco IOS MD5 BruteForce Mask - by undeath - 04-14-2015, 11:15 PM
RE: Cisco IOS MD5 BruteForce Mask - by d@rsh - 04-14-2015, 11:17 PM
RE: Cisco IOS MD5 BruteForce Mask - by d@rsh - 04-14-2015, 11:17 PM
RE: Cisco IOS MD5 BruteForce Mask - by undeath - 04-14-2015, 11:21 PM