04-17-2015, 01:12 AM
Yes, that's what I meant. To be safe, I always put all the switches/options (starting with - or --) between the program (cudahashcat, oclhashcat, hashcat-cli...) and the target (usually an hash file). After that, you put the dics and/or masks (masks are like ?1?1?1?1?1?1?1?1). In your specific case, you could have avoided the -1 ?a and use directly ?a in the mask like ?a?a?a?a?a?a?a?a?a?a. My command line for your attack would have looked like that:
Code:
cudaHashCat64 -a 3 -m 0 -o crackedhashes.txt --outfile-format=2 -i orangehashes2.txt ?a?a?a?a?a?a?a?a?a?a