$P$B8... first time, GPU nVdia, Dual Core:DHCP
#1
Boys, girls,

I got a personal pass that i want to recover. Ive entered a server secretly, had the order from KSA.


I got a fast nVidia Cuda GPU, with windows 7 64 bit, and an i7 CPU.

the pass comes from the newest wordpress CMS, is as follow:

$P$B8********** etc

how2 recover it? Thanks.

Im a nebbiez in this part of technique.
#2
Read the rules before you post next time.
#3
Sorry, ive read them now, eeuhrm si its like this: ive got the hashcat.exe, ive entered my hashcode, but i dont see "run"or something, how come?
#4
(11-05-2012, 09:15 PM)kasmi.achmed Wrote: Sorry, ive read them now, eeuhrm si its like this: ive got the hashcat.exe, ive entered my hashcode, but i dont see "run"or something, how come?

You may prefer to use Blandy's GUI if you are new to hashcat or hashcat-plus.
#5
Friend, ive opened the Blandy GUI, went to oclHashcat-lite, entered the hashcode, but i can't click "Reverse Engineer". I think im getting it, some other ppl(groupie) hlping me now
#6
I must admit I don't really know anything about the hash type you are testing as I mainly stick to WPA.

However I have had a look on the wiki and it seems that you might want to use hashcat-plus not lite.

Hashcat-plus supports this...400 = phpass, MD5(Wordpress), MD5(phpBB3)

Which I guess is what you want ?

Here's the wiki page.
#7
2 Years? Smile


[Image: hashw.jpg]

not needed anymore, a friend got it all! hmdl
#8
(11-05-2012, 08:54 PM)kasmi.achmed Wrote: I got a fast nVidia Cuda GPU

If there is such a thing as a fast Nvidia GPU, the GTX 460 sure ain't it.
#9
There are reason why you dont want to Brute-Force phpass passwords. For example slow performance Smile