Hashcat-gui does nothing
#1
Exclamation 
Hello guys, i'm tryin to crack an IPB 3 Hash+Salt on windows 7 with hashcat and oclhashcat-plus with bruteforce, but it seems like nothing happens anytime i put in the commands.
I've tried with the gui and also with the command line, but the same thing happens, i mean absolutely "nothing", not even an error message. I bet i'm missing something huge here, and i'd be glad if someone could assist me by pointing out my mistakes.
So... here are the commands i use:

Code:
oclHashcat-plus64.exe --hash-type 2811 --attack-mode 3 --cpu-affinity 2 --gpu-devices 1 D:\OWEN\Hash\black.txt

Code:
hashcat-cli64.exe --hash-mode 1 --attack-mode 3 D:\OWEN\Hash\black.txt

And do i need to compile or install something apart from python, opencl, and net. framework before hashcat can work?

And by the way do i need any special set-up to use mask attack instead of brute-force?
#2
When you write these commands in a shell prompt, what do you have ?
Errors can be:
- something like "hashcat command not found" : means that you are not in the good directory,
- an error with hashcat : paste it here.

If you launch your commands from hashcat-gui, be aware that the executables shall be in the directories, you should extract *all* files.
#3
Yes, you are missing a mask. Read here: https://hashcat.net/wiki/mask_attack
#4
(06-24-2012, 02:15 AM)Mem5 Wrote: When you write these commands in a shell prompt, what do you have ?
Errors can be:
- something like "hashcat command not found" : means that you are not in the good directory,
- an error with hashcat : paste it here.

If you launch your commands from hashcat-gui, be aware that the executables shall be in the directories, you should extract *all* files.

sincerely nothing happens, anyway i've installed backtrack on my hard drive, 'cause when i tried to use it on the backtrack on virtualbox it somehow worked, so now i'll try it on this new installation of backtrack.

(06-24-2012, 07:29 AM)atom Wrote: Yes, you are missing a mask. Read here: https://hashcat.net/wiki/mask_attack
So i basically need to know the password length and each character int... that's quite hard, is there anyway to know how long the password is, by having the salt?
#5
you did not read the article very carefully. read this subsection: https://hashcat.net/wiki/mask_attack#pas..._increment
#6
(06-24-2012, 12:29 PM)atom Wrote: you did not read the article very carefully. read this subsection: https://hashcat.net/wiki/mask_attack#pas..._increment

to make it work i just got the backtrack distro and using it from there... anyway talkin about the mask attack, i dont see any option on normal hashcat to use mask attack.

BTW Is there a section in the forum where i could post the hash + salt so some good samaritan could help me crack it?
#7
MD5Decrypter.co.uk Forum
InsidePro Forum
#8
(06-24-2012, 02:55 PM)M@LIK Wrote: MD5Decrypter.co.uk Forum
InsidePro Forum

Thank You Sir
#9
Actually I have the same problem atm..On linux but instead of doing absolutely nothing it says this:

cudaHashcat-lite v0.9 starting...

GPU-Loops:150
GPU-Accel:1
Password lengths range: 1-15
Platform: NVidia compatible platform found
Watchdog: Temperature limit set to 90c
Device #1: Quadro NVS 135M, 127MB, 800Mhz, 1MCU

but after that it just sits there and doesn't take up any CPU energy or anything O.o
#10
paste your command line and your status screen output.