Combinator Attack Rule Limits
#2
Hey Globus,

The rule and the commandline you provided should crack the hash, yes. I tried to reproduce this with latest oclHashcat but can't. Maybe you use an older version? See my log:

Quote:root@sf:~/oclHashcat-1.22# echo PASSWOR > dict1
root@sf:~/oclHashcat-1.22# echo D123 > dict2
root@sf:~/oclHashcat-1.22# echo -n Password123 | iconv -t utf16le | openssl dgst -md4
(stdin)= 58a478135a93ac3bf058a5ea0e8fdb71
root@sf:~/oclHashcat-1.22# ./oclHashcat64.bin -d1 58a478135a93ac3bf058a5ea0e8fdb71 -m1000 -a1 dict1 dict2 -j "T1 T2 T3 T4 T5 T6" -k "T0" --weak-hash-threshold 0 --potfile-disable --quiet
58a478135a93ac3bf058a5ea0e8fdb71Tongueassword123


Messages In This Thread
Combinator Attack Rule Limits - by globus - 05-28-2014, 07:28 PM
RE: Combinator Attack Rule Limits - by atom - 05-30-2014, 09:38 AM
RE: Combinator Attack Rule Limits - by globus - 06-05-2014, 05:42 PM