Hello, I don't want to you use the gui version anymore.
But I don't know what to key in for brute forcing a md5 hash.
I've been trying for hours. I read the help but I don't get.
Could you give me an expamle?
I hope you can help me.
tori
I don't know how to put the other parameters together.
(03-08-2013, 11:18 PM)tori Wrote: [ -> ]I don't know how to put the other parameters together.
What exactly do you want it to do ?
Are you using CUDA or OCL ?
(03-08-2013, 11:44 PM)tori Wrote: [ -> ]I want to use ocl
OK well that's a start, can you be more specific please ?
32 or 64 bit ? Then please explain exactly what you want to do.
32 bit I want just brute force a md5. But i don't know what to key in.
(03-08-2013, 11:56 PM)tori Wrote: [ -> ]32 bit I want just brute force a md5. But i don't know what to key in.
Oh dear, its going to be a long night isn't it ? You are making me work for this aren't you ?
I assume you are using Windows ?
OK so you want to use oclhachat 32bit and you want to brute force MD5.
What characters do you want to use ?
How long do you expect the password to be ?
Do you want to increment ?
If you do want to increment please state a min and max.
How many MD5's ? A single one or a list of ?
Do you want to remove the found hashes or retain them ?
yes I'm using windows 7
numbers and letters uppercase lowercase
7 characters
a single hash
(03-09-2013, 12:15 AM)tori Wrote: [ -> ]yes I'm using windows 7
numbers and letters uppercase lowercase
7 characters
a single hash
OK try this.
I have used oclhashcat-plus in this example because you wanted to just test length 7. Normally if you are brute forcing a single MD5 you would probably want to use oclhashcat-lite. However I personally like oclhashcat-plus better and when you want to test a list of MD5 you will have to use oclhashcat anyway.
oclHashcat-plus32.exe -a 3 -m 0 --force -1 ?u?l?d "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" ?1?1?1?1?1?1?1 -o found.txt
Run this in the same directory as oclhashcat-plus.
oclhashcat-plus.exe call the program.
-a 3 is the attack mode, in this case brute force.
-m 0 tells ocllhashcat to test MD5
--force is because we are testing a single MD5 in oclhashcat-plus (don't worry too much about this now)
-1 defines the value of 1
?u?l?d Upper Lower Digit
"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" put your hash here.
?1?1?1?1?1?1?1 Length 7 using definition of 1
-o Found.txt Out put found password to file called "Found.txt"