12-14-2012, 02:57 PM
Hi I am new to hashcat in general .
I have used hashcat to find sha1 and MD5 hashes which its done with great speed...
I used to use pyrit for my wireless WPA attacks but due to graphics card changes I couldnt get pyrit to work but found the installation of hashcat a doddle
my cracker machine
AMD 1055T Phenom_II which runs 2.8Ghz over clockable to 3.6Ghz (It was overclocked with the bundle i bought) I now run at stock 2.8
I use an ASUS 5870 Ares Graphics card which is a dual 5870 on one board.
OS i run backtrack 5r3
That gives you an idea of what i am working with:
My question :
This is the command i would use to get crunch to create a wordlist that i need.
This would generate a 10 char password using abcdef0123456789 and would not allow more than 2 identical chars..
In hashcat i use :
after reading the wiki i can see you can use rules for many things but I don't understand how how to get the mask to skip passwords that are not compliant.
I hope this make sense
Thanks for any help.....
The Raver
I have used hashcat to find sha1 and MD5 hashes which its done with great speed...
I used to use pyrit for my wireless WPA attacks but due to graphics card changes I couldnt get pyrit to work but found the installation of hashcat a doddle
my cracker machine
AMD 1055T Phenom_II which runs 2.8Ghz over clockable to 3.6Ghz (It was overclocked with the bundle i bought) I now run at stock 2.8
I use an ASUS 5870 Ares Graphics card which is a dual 5870 on one board.
OS i run backtrack 5r3
That gives you an idea of what i am working with:
My question :
This is the command i would use to get crunch to create a wordlist that i need.
Code:
./crunch 10 10 -f charset.lst hex-lower -i -d 2 -b 100GB -o /media/sf_Desktop/passwords/START
In hashcat i use :
Code:
./oclHashcat-plus64.bin -m 2500 -a 3 -n 8 --gpu-loops=45 -1 abcdef?d /pentest/passwords/oclhashcat+/mynetworkcap.hccap ?1?1?1?1?1?1?1?1?1?1
I hope this make sense
Thanks for any help.....
The Raver