Newbie question that I'm hoping is just me making a simple mistake. I just wanted to test out oclHashcat, but on my test cases it's only cracking a single hash and ignoring all the rest; even when I know my dictionary contains the correct plain text password. The plain text test cases are below:
!Q@W#E$R1q2w3e4r
zse4xdr5cft6vgy7
ZSE$^TFCxdr5&YGV
zaxscdvfZAXSCDVF
qwertyqwerty1234
123456789qwertyu
Also I'm using a simple python script to generate NTLM hashes; the code is below for reference:
import hashlib
import binascii
import sys
import os
with open("testfile.txt", 'r') as f:
for plain_text in f:
hash = hashlib.new('md4', plain_text.encode('utf-16le')).digest()
print binascii.hexlify(hash)
Also, here is the command I'm running:
cudaHashcat64 -m 1000 -a 0 hashfile.txt plaintext.txt
What's weird is that it appears that it's only cracking the hash that corresponds to the last line in the dictionary, but I'm not sure that definitely the case.
Any help would be great!
BTW I'm running version 1.01
!Q@W#E$R1q2w3e4r
zse4xdr5cft6vgy7
ZSE$^TFCxdr5&YGV
zaxscdvfZAXSCDVF
qwertyqwerty1234
123456789qwertyu
Also I'm using a simple python script to generate NTLM hashes; the code is below for reference:
import hashlib
import binascii
import sys
import os
with open("testfile.txt", 'r') as f:
for plain_text in f:
hash = hashlib.new('md4', plain_text.encode('utf-16le')).digest()
print binascii.hexlify(hash)
Also, here is the command I'm running:
cudaHashcat64 -m 1000 -a 0 hashfile.txt plaintext.txt
What's weird is that it appears that it's only cracking the hash that corresponds to the last line in the dictionary, but I'm not sure that definitely the case.
Any help would be great!
BTW I'm running version 1.01