Boys, girls,
I got a personal pass that i want to recover. Ive entered a server secretly, had the order from KSA.
I got a fast nVidia Cuda GPU, with windows 7 64 bit, and an i7 CPU.
the pass comes from the newest wordpress CMS, is as follow:
$P$B8********** etc
how2 recover it? Thanks.
Im a nebbiez in this part of technique.
Read the rules before you post next time.
Sorry, ive read them now, eeuhrm si its like this: ive got the hashcat.exe, ive entered my hashcode, but i dont see "run"or something, how come?
(11-05-2012, 09:15 PM)kasmi.achmed Wrote: [ -> ]Sorry, ive read them now, eeuhrm si its like this: ive got the hashcat.exe, ive entered my hashcode, but i dont see "run"or something, how come?
You may prefer to use Blandy's
GUI if you are new to hashcat or hashcat-plus.
Friend, ive opened the Blandy GUI, went to oclHashcat-lite, entered the hashcode, but i can't click "Reverse Engineer". I think im getting it, some other ppl(groupie) hlping me now
I must admit I don't really know anything about the hash type you are testing as I mainly stick to WPA.
However I have had a look on the wiki and it seems that you might want to use hashcat-plus not lite.
Hashcat-plus supports this...400 = phpass, MD5(Wordpress), MD5(phpBB3)
Which I guess is what you want ?
Here's the
wiki page.
2 Years?
not needed anymore, a friend got it all! hmdl
(11-05-2012, 08:54 PM)kasmi.achmed Wrote: [ -> ]I got a fast nVidia Cuda GPU
If there is such a thing as a fast Nvidia GPU, the GTX 460 sure ain't it.
There are reason why you dont want to Brute-Force phpass passwords. For example slow performance