Posts: 803
Threads: 135
Joined: Feb 2011
Hi,
With the latest hashcat-gui version I did (for MD5 hash):
Code:
hashcat-cli64.exe --attack-mode 3 --output-file C:\Users\M\Desktop\h.txt.out --custom-charset1 azerty --threads 4 C:\Users\M\Desktop\hashes.txt
it gives me :
Code:
Usage: hashcat [options] hashfile [mask|wordfiles|directories]
Try --help for more help.
What is wrong ?
Thanks
Posts: 347
Threads: 3
Joined: May 2010
The mask is missing in your command line, try with something like :
Code:
hashcat-cli64.exe --attack-mode 3 --output-file C:\Users\M\Desktop\h.txt.out --custom-charset1 azerty --threads 4 C:\Users\M\Desktop\hashes.txt ?1?1?1?1?1?1?1?1
For length 8 with the charset "azerty".
Posts: 803
Threads: 135
Joined: Feb 2011
Thanks, it works better.
But, how can I use at the same time
Quote:--bf-pw-min=NUM password length minimum
--bf-pw-max=NUM password length maximum
and the mask ? They seem incompatible.
For eg, if I want to bruteforce on digits only from 1 to 8 chars :
Code:
--pw-min=1 --pw-max=8 ?d
this does not work
Posts: 5,185
Threads: 230
Joined: Apr 2010
Brute-Force is no longer supported in hashcat since its an outdated technique. Please use mask-attack which replaces it.
Posts: 803
Threads: 135
Joined: Feb 2011
03-30-2012, 02:58 PM
(This post was last modified: 03-30-2012, 02:59 PM by Mem5.)
Ok.
1) So --bf-min and --bf-max in the hashcat help are useless ?
2) Incremental switch (-i) has disappeared too ?
To 'emulate' bf-min' and 'bf-max' should I write :
Quote:hashcat-cli64.exe -m 0 -a 3 -o h.txt.out --custom-charset1 0123456789 hashes.txt ?d
hashcat-cli64.exe -m 0 -a 3 -o h.txt.out --custom-charset1 0123456789 hashes.txt ?d?d
hashcat-cli64.exe -m 0 -a 3 -o h.txt.out --custom-charset1 0123456789 hashes.txt ?d?d?d
...
?
Posts: 5,185
Threads: 230
Joined: Apr 2010