Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Problem with md5 brute force
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
Hello, I don't want to you use the gui version anymore.
But I don't know what to key in for brute forcing a md5 hash.
I've been trying for hours. I read the help but I don't get.
Could you give me an expamle?
I hope you can help me.

tori
From here.

Code:
* Generic hash types:

    0 = MD5
   10 = md5($pass.$salt)
   20 = md5($salt.$pass)
   30 = md5(unicode($pass).$salt)
   40 = md5($salt.unicode($pass))
  100 = SHA1
  110 = sha1($pass.$salt)
  120 = sha1($salt.$pass)
  130 = sha1(unicode($pass).$salt)
  140 = sha1($salt.unicode($pass))
  300 = MySQL
  400 = phpass, MD5(Wordpress), MD5(phpBB3)
  500 = md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
  900 = MD4
1000 = NTLM
1100 = Domain Cached Credentials, mscash
1400 = SHA256
1410 = sha256($pass.$salt)
1420 = sha256($salt.$pass)
1500 = descrypt, DES(Unix), Traditional DES
1600 = md5apr1, MD5(APR), Apache MD5
1700 = SHA512
1710 = sha512($pass.$salt)
1720 = sha512($salt.$pass)
1800 = sha512crypt, SHA512(Unix)
2100 = Domain Cached Credentials2, mscash2
2400 = Cisco-PIX MD5
2500 = WPA/WPA2
2600 = Double MD5
3000 = LM
3100 = Oracle 7-10g, DES(Oracle)
3200 = bcrypt, Blowfish(OpenBSD)
5000 = SHA-3(Keccak)
5100 = Half MD5
5200 = Password Safe SHA-256
5300 = IKE-PSK MD5
5400 = IKE-PSK SHA1

* Specific hash types:

   11 = Joomla
   21 = osCommerce, xt:Commerce
  101 = nsldap, SHA-1(Base64), Netscape LDAP SHA
  111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
  112 = Oracle 11g
  121 = SMF > v1.1
  122 = OSX v10.4, v10.5, v10.6
  131 = MSSQL(2000)
  132 = MSSQL(2005)
  141 = EPiServer 6.x
1722 = OSX v10.7
2611 = vBulletin < v3.8.5
2711 = vBulletin > v3.8.5
2811 = IPB2+, MyBB1.2+
I don't know how to put the other parameters together.
(03-08-2013, 11:18 PM)tori Wrote: [ -> ]I don't know how to put the other parameters together.

What exactly do you want it to do ?

Are you using CUDA or OCL ?
I want to use ocl
(03-08-2013, 11:44 PM)tori Wrote: [ -> ]I want to use ocl

OK well that's a start, can you be more specific please ?

32 or 64 bit ? Then please explain exactly what you want to do.
32 bit I want just brute force a md5. But i don't know what to key in.
(03-08-2013, 11:56 PM)tori Wrote: [ -> ]32 bit I want just brute force a md5. But i don't know what to key in.

Smile

Oh dear, its going to be a long night isn't it ? You are making me work for this aren't you ? Big Grin

I assume you are using Windows ?

OK so you want to use oclhachat 32bit and you want to brute force MD5.

What characters do you want to use ?

How long do you expect the password to be ?

Do you want to increment ?

If you do want to increment please state a min and max.

How many MD5's ? A single one or a list of ?

Do you want to remove the found hashes or retain them ?
yes I'm using windows 7
numbers and letters uppercase lowercase
7 characters
a single hash
(03-09-2013, 12:15 AM)tori Wrote: [ -> ]yes I'm using windows 7
numbers and letters uppercase lowercase
7 characters
a single hash

OK try this.

I have used oclhashcat-plus in this example because you wanted to just test length 7. Normally if you are brute forcing a single MD5 you would probably want to use oclhashcat-lite. However I personally like oclhashcat-plus better and when you want to test a list of MD5 you will have to use oclhashcat anyway.

oclHashcat-plus32.exe -a 3 -m 0 --force -1 ?u?l?d "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" ?1?1?1?1?1?1?1 -o found.txt

Run this in the same directory as oclhashcat-plus.

oclhashcat-plus.exe call the program.

-a 3 is the attack mode, in this case brute force.

-m 0 tells ocllhashcat to test MD5

--force is because we are testing a single MD5 in oclhashcat-plus (don't worry too much about this now)

-1 defines the value of 1

?u?l?d Upper Lower Digit

"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" put your hash here.

?1?1?1?1?1?1?1 Length 7 using definition of 1

-o Found.txt Out put found password to file called "Found.txt"

Smile
Pages: 1 2