Posts: 2
	Threads: 1
	Joined: May 2010
	
	
 
	
		
		
		05-26-2010, 07:36 PM 
(This post was last modified: 05-26-2010, 08:18 PM by fqm1c8.)
		
	 
	
		atom, anyone
can you help me with syntax please.
brute md5 option-5 for a length range?  say 4 to 10 characters (lowercase , numeric) ?
I get how to do the fixed length brutes.
second, can you use more than 1 dictionary during the cmd line attacks?
regards
update - more reading leads me to believe you must execute it a number of times to check each possible length?  so no "set and run" we must execute each attempt right?
	
	
	
	
	
 
 
	
	
	
		
	Posts: 601
	Threads: 18
	Joined: Apr 2010
	
	
 
	
	
		Yes, minimal password length cant be defined yet.
Indeed, one dictionary + mask ; or one dictionary + another dictionary.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 620
	Threads: 57
	Joined: May 2010
	
	
 
	
		
		
		05-27-2010, 05:53 AM 
(This post was last modified: 05-27-2010, 05:55 AM by mastercracker.)
		
	 
	
		 (05-26-2010, 07:36 PM)fqm1c8 Wrote:  atom, anyone
can you help me with syntax please.
brute md5 option-5 for a length range?  say 4 to 10 characters (lowercase , numeric) ?
I get how to do the fixed length brutes.
second, can you use more than 1 dictionary during the cmd line attacks?
regards
update - more reading leads me to believe you must execute it a number of times to check each possible length?  so no "set and run" we must execute each attempt right?
It might depend on the OS.  I can only talk about Windows.  Open a text editor (like Notepad) and put the following lines:
Code:
oclHashcat.exe -o found.txt -m 5 test.hash -1 ?d?l ?1?1?1?1
oclHashcat.exe -o found.txt -m 5 test.hash -1 ?d?l ?1?1?1?1 ?1
oclHashcat.exe -o found.txt -m 5 test.hash -1 ?d?l ?1?1?1?1 ?1?1
oclHashcat.exe -o found.txt -m 5 test.hash -1 ?d?l ?1?1?1?1 ?1?1?1
oclHashcat.exe -o found.txt -m 5 test.hash -1 ?d?l ?1?1?1?1 ?1?1?1?1
oclHashcat.exe -o found.txt -m 5 test.hash -1 ?d?l ?1?1?1?1 ?1?1?1?1?1
oclHashcat.exe -o found.txt -m 5 test.hash -1 ?d?l ?1?1?1?1 ?1?1?1?1?1?1
Save the file as test.bat in the same folder as OclHashcat.
Double-click on the file test.bat to run all of the attack.  The only attack I am not sure of is the first line since I am not sure if the program needs the "Right" argument to work.  Each line is an attack.  Here's the explanation of the arguments on each line:
oclhashcat.exe is the program to run
-o found.txt specifies where the cracked passwords will be saved.
- m 5 is the mode 5 you requested
test.hash is the file containing the list of hashes
-1 ?d?l sets the mask 1 as loweralpha-numeric
?1?1?1?1 is the Left mask
?1?1 is the Right mask
Good luck.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 5,232
	Threads: 233
	Joined: Apr 2010
	
	
 
	
	
		update: recent oclHashcat versions support --increment flag