oclHashcat bruteforce
#3
(02-02-2015, 06:16 PM)forumhero Wrote: yes but you need to add the ?a for each position of the password length. for example if you think the password is 6 characters then you need
?a?a?a?a?a?a

for 8 characters you want
?a?a?a?a?a?a?a?a

and so on.

you don't need the -1 unless you are using it as a variable, which looks like this
-1 ?l?u?d?s ?1?1?1?1?1?1

that does the same as the above ?a example.

more examples

http://hashcat.net/wiki/doku.php?id=mask_attack

Thanks for the reply. Now I've understood about -1 usage.
But i still don't get how to brute all possible passwords if I do not know the length of a password. Lets say I want to start from 1 charachter passwords and go to 7 charachter passwords. Do I need to use some mask file or increment option?


Messages In This Thread
oclHashcat bruteforce - by krest - 02-02-2015, 05:52 PM
RE: oclHashcat bruteforce - by forumhero - 02-02-2015, 06:16 PM
RE: oclHashcat bruteforce - by krest - 02-03-2015, 08:54 AM
RE: oclHashcat bruteforce - by atom - 02-03-2015, 04:59 PM
RE: oclHashcat bruteforce - by krest - 02-04-2015, 03:14 PM
RE: oclHashcat bruteforce - by undeath - 02-04-2015, 05:27 PM
RE: oclHashcat bruteforce - by krest - 02-05-2015, 12:31 PM
RE: oclHashcat bruteforce - by azren - 02-05-2015, 02:12 PM
RE: oclHashcat bruteforce - by krest - 02-05-2015, 02:36 PM
RE: oclHashcat bruteforce - by rsberzerker - 02-05-2015, 03:12 PM
RE: oclHashcat bruteforce - by krest - 05-25-2015, 03:35 PM
RE: oclHashcat bruteforce - by undeath - 05-25-2015, 03:37 PM
RE: oclHashcat bruteforce - by krest - 05-25-2015, 03:41 PM