oclHashCat-plus64 MD5(unix) cracking help
#11
np, i you check the -h option of hashcat like
cudaHashcat-plus64.exe -h
you will get many useful information Wink
#12
(05-01-2013, 06:52 PM)TrAnn3l Wrote: To crack all possible combinations just use:
cudaHashcat-plus64.exe -m 500 -a 3 -i --increment-max 6
that bruteforces all possible combination with ?u?l?s?d with a max. lenght of 6 chars.

i tested your command now..
i md5ed "zar2Hh" and saved it into a file in /md5.txt
and used your command :
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 -i --increment-max=7 -o /cr3.txt /md5.txt --force
>>
Code:
.
.
.
.
.
.
.
[s]tatus [p]ause [r]esume [b]ypass [q]uit => s
Session.Name...: cudaHashcat-plus
Status.........: Running
Input.Mode.....: Mask (?1?2?2?2?2?2?2)
Hash.Target....: 52XXX8b6e589XXXaf861ee104baXXX19
Hash.Type......: MD5
Time.Started...: Wed May  1 23:25:05 2013 (2 mins, 47 secs)
Time.Estimated.: Wed May  1 23:36:22 2013 (8 mins, 9 secs)
Speed.GPU.#1...:   205.9M/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 34401157120/134960504832 (25.49%)
Rejected.......: 0/34401157120 (0.00%)
HWMon.GPU.#1...: -1% Util, 59c Temp, -1% Fan

                                            
Session.Name...: cudaHashcat-plus
Status.........: Exhausted
Input.Mode.....: Mask (?1?2?2?2?2?2?2)
Hash.Target....: 52028XXXX5898d4aXXX1ee104ba49f19
Hash.Type......: MD5
Time.Started...: Wed May  1 23:25:05 2013 (10 mins, 59 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...:   205.7M/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 134960504832/134960504832 (100.00%)
Rejected.......: 0/134960504832 (0.00%)
HWMon.GPU.#1...: -1% Util, 45c Temp, -1% Fan

Started: Wed May  1 23:25:05 2013
Stopped: Wed May  1 23:36:25 2013

it must be cracked if your command is cheacking all combinations , yea ?
is it possible to test all combinations `atom` ? Sad
#13
I tried the same hash you had, didn't crack it too, but then i tried it with a other command.
i cracked the hash, using
Code:
oclHashcat-plus64.exe -a 3 "hash.txt" ?a?a?a?a?a?a
well, i think there is a difference between using bruteforce only with -a 3 ,
and using it with the mask ?a?a?a?a?a?a (a stands for ?l?u?d?s). i don't know why, but maybe Atom can us say what is here going on.
#14
blind leading the blind.

if you don't specify a mask in mask mode, it uses the default built-in mask, which is almost never what you want.

if all you want to do is incrementally brute force all characters through length 7, you would simply use:

Code:
-a 3 -i ?a?a?a?a?a?a?a
#15
And what is the default built-in mask?
#16
last, i knew, it was:

-1 ae10i2onrls938t45m67cdyhubkgpjvfwzAxEILORNSMTCDBqHYKUPGJFVWZXQ
-2 ae10i2onrls938t45m67cdyhubkgpjvfwzxq
-3 ae10i2onrls938t45m67cdyhubkgpjvfwzx._q!-*@
-4 1029384567

?1?2?2?2?2?2?2?3?3?3?3?4?4?4?4

but it may have changed
#17
(05-01-2013, 10:52 PM)epixoip Wrote: blind leading the blind.

if you don't specify a mask in mask mode, it uses the default built-in mask, which is almost never what you want.

if all you want to do is incrementally brute force all characters through length 7, you would simply use:

Code:
-a 3 -i ?a?a?a?a?a?a?a

tnQ epixoip ...
is it possible for my speed to crack this hash ? Sad
_________________________________________________________
for crack a 4lenght pass..
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i --increment-min=1 --increment-max=12 --force
#18
The MD5 hash of "zar2Hh" should be cracked in a short time. For the MD5(unix), it will take much longer (and don't forget to use -m 500 instead of -m 0). It would be easier if you use an adapted mask like ?l?l?l?d?u?l. However in a real case scenario, you don't know that so you go for the highest probabilities, meaning that you start with first letter upper or lower case, followed by a bunch of lowercase letter and maybe finishing by 1-4 numbers.
#19
If you only want to crack one hash, you should use cudaHashcat-lite, that is much faster than normal cudaHashcat-plus, but you can only crack one hash at time. Also, if you want to crack a 4 length password, you don't need 12x ?a, you only need 4x ?a, and the increment things you typed are not really necessary.
The command to brute-force a 4 length password should be
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a
and if you want to crack all possible passwords up to 12 chars(which is really time-consuming with a not specified mask) the command should be
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i
And if you want to crack MD5(unix), you should use -m 500 instead of -m 0, just like mastercracker said.
#20
can we use -m 500 in lite version ?
cause i cant see 500 option in hash mode list in --help .


anyway ... i understand , i cant crack it via one gpu because this md5 type give a heavy work to generate and check. so i must use multi gpus Or use good mask Big Grin

tanx from all for repling ..