05-01-2013, 08:07 PM
np, i you check the -h option of hashcat like
cudaHashcat-plus64.exe -h
you will get many useful information
cudaHashcat-plus64.exe -h
you will get many useful information
oclHashCat-plus64 MD5(unix) cracking help
|
05-01-2013, 08:07 PM
np, i you check the -h option of hashcat like
cudaHashcat-plus64.exe -h you will get many useful information (05-01-2013, 06:52 PM)TrAnn3l Wrote: To crack all possible combinations just use: i tested your command now.. i md5ed "zar2Hh" and saved it into a file in /md5.txt and used your command : Code: ./cudaHashcat-plus64.bin -m 0 -a 3 -i --increment-max=7 -o /cr3.txt /md5.txt --force Code: . it must be cracked if your command is cheacking all combinations , yea ? is it possible to test all combinations `atom` ?
05-01-2013, 10:07 PM
I tried the same hash you had, didn't crack it too, but then i tried it with a other command.
i cracked the hash, using Code: oclHashcat-plus64.exe -a 3 "hash.txt" ?a?a?a?a?a?a and using it with the mask ?a?a?a?a?a?a (a stands for ?l?u?d?s). i don't know why, but maybe Atom can us say what is here going on.
05-01-2013, 10:52 PM
blind leading the blind.
if you don't specify a mask in mask mode, it uses the default built-in mask, which is almost never what you want. if all you want to do is incrementally brute force all characters through length 7, you would simply use: Code: -a 3 -i ?a?a?a?a?a?a?a
05-01-2013, 11:00 PM
And what is the default built-in mask?
05-01-2013, 11:22 PM
last, i knew, it was:
-1 ae10i2onrls938t45m67cdyhubkgpjvfwzAxEILORNSMTCDBqHYKUPGJFVWZXQ -2 ae10i2onrls938t45m67cdyhubkgpjvfwzxq -3 ae10i2onrls938t45m67cdyhubkgpjvfwzx._q!-*@ -4 1029384567 ?1?2?2?2?2?2?2?3?3?3?3?4?4?4?4 but it may have changed (05-01-2013, 10:52 PM)epixoip Wrote: blind leading the blind. tnQ epixoip ... is it possible for my speed to crack this hash ? _________________________________________________________ for crack a 4lenght pass.. Code: ./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i --increment-min=1 --increment-max=12 --force
05-02-2013, 02:44 PM
The MD5 hash of "zar2Hh" should be cracked in a short time. For the MD5(unix), it will take much longer (and don't forget to use -m 500 instead of -m 0). It would be easier if you use an adapted mask like ?l?l?l?d?u?l. However in a real case scenario, you don't know that so you go for the highest probabilities, meaning that you start with first letter upper or lower case, followed by a bunch of lowercase letter and maybe finishing by 1-4 numbers.
05-02-2013, 04:55 PM
If you only want to crack one hash, you should use cudaHashcat-lite, that is much faster than normal cudaHashcat-plus, but you can only crack one hash at time. Also, if you want to crack a 4 length password, you don't need 12x ?a, you only need 4x ?a, and the increment things you typed are not really necessary.
The command to brute-force a 4 length password should be Code: ./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a Code: ./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i
05-04-2013, 09:43 AM
can we use -m 500 in lite version ?
cause i cant see 500 option in hash mode list in --help . anyway ... i understand , i cant crack it via one gpu because this md5 type give a heavy work to generate and check. so i must use multi gpus Or use good mask tanx from all for repling .. |
« Next Oldest | Next Newest »
|