Hey Guys,
I need help at the redesign of the help-screen of oclHashcat-plus v0.07.
The goal is it to make it easier to understand and to look better. If someone is bored, feel free to try it
- You can not change parameter name
- Try not to exceed 78 chars per line
--
atom
I need help at the redesign of the help-screen of oclHashcat-plus v0.07.
The goal is it to make it easier to understand and to look better. If someone is bored, feel free to try it
- You can not change parameter name
- Try not to exceed 78 chars per line
Code:
oclHashcat-plus, advanced password recovery
Usage: oclHashcat-plus [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...
=======
Options
=======
* General:
-m, --hash-type=NUM Hash-type, see references below
-a, --attack-mode=NUM Attack-mode, see references below
-V, --version Print version
-h, --help Print help
--eula Print EULA
--quiet Suppress output
* Misc:
--runtime=NUM Abort session after NUM seconds of runtime
--hex-salt Assume salt is given in hex
--hex-charset Assume charset is given in hex
* Outfile:
-o, --outfile=FILE Define outfile for recovered hash
--outfile-format=NUM Define outfile-format for recovered hash
--show Show cracked passwords only
--left Show un-cracked passwords only
--username Enable ignoring of usernames in hashfile
--remove Enable remove of hash once it is cracked
* Resources:
-c, --segment-size=NUM Size in MB to cache from the wordfile
--gpu-async Use non-blocking async calls (NV only)
-d, --gpu-devices=STR Devices to use, separate with comma
-n, --gpu-accel=NUM Workload tuning: 1, 8, 40, 80, 160
--gpu-loops=NUM Workload fine-tuning: 8 - 1024
--gpu-watchdog=NUM Abort session at NUM degrees celsius
* Rules:
-r, --rules-file=FILE Rules-file, multiple use is supported
-g, --generate-rules=NUM Generate NUM random rules
--generate-rules-func-min=NUM Force NUM functions per random rule min
--generate-rules-func-max=NUM Force NUM functions per random rule max
* Custom charsets:
-1, --custom-charset1=CS User-defined charsets
-2, --custom-charset2=CS Example:
-3, --custom-charset3=CS --custom-charset1=?dabcdef
-4, --custom-charset4=CS Sets charset ?1 to 0123456789abcdef
* Permutation attack-mode specific:
--perm-min=NUM Filter words shorter than NUM
--perm-max=NUM Filter words larger than NUM
==========
References
==========
* Outfile Formats:
1 = hash[:salt]
2 = plain
3 = hash[:salt]:plain
4 = hex_plain
5 = hash[:salt]:hex_plain
6 = plain:hex_plain
7 = hash[:salt]:plain:hex_plain
* Built-in charsets:
?l = abcdefghijklmnopqrstuvwxyz
?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d = 0123456789
?s = !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
?h = 8 bit characters from 0xc0 - 0xff
?D = 8 bit characters from german alphabet
?F = 8 bit characters from french alphabet
?R = 8 bit characters from russian alphabet
* Attack modes:
0 = Straight
1 = Combination
3 = Brute-force
4 = Permutation
6 = Hybrid dict + mask
7 = Hybrid mask + dict
* Hash types:
0 = MD5
1 = Joomla
2 = osCommerce, xt:Commerce
5 = vBulletin < v3.8.5
9 = IPB 2.0, MyBB1.2
15 = vBulletin > v3.8.5
100 = SHA1
101 = SMF > v1.1
105 = OSX v10.4, v10.5, v10.6
300 = MySQL > v4.1
400 = phpass, MD5(Wordpress), MD5(phpBB3)
500 = md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
600 = nsldap, SHA-1(Base64), Netscape LDAP SHA
700 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
900 = MD4
1000 = NTLM
1100 = Domain Cached Credentials, mscash
1300 = MSSQL(2000)
1400 = SHA256
1500 = descrypt, DES(Unix), Traditional DES
1600 = md5apr1, MD5(APR), Apache MD5
2000 = Oracle 11g
2100 = Domain Cached Credentials2, mscash2
2300 = MSSQL(2005)
2400 = Cisco-PIX MD5
2500 = WPA/WPA2
--
atom