05-01-2013, 08:07 PM
Pages: 1 2
05-01-2013, 09:21 PM
(05-01-2013, 06:52 PM)TrAnn3l Wrote: [ -> ]To crack all possible combinations just use:
cudaHashcat-plus64.exe -m 500 -a 3 -i --increment-max 6
that bruteforces all possible combination with ?u?l?s?d with a max. lenght of 6 chars.
i tested your command now..
i md5ed "zar2Hh" and saved it into a file in /md5.txt
and used your command :
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 -i --increment-max=7 -o /cr3.txt /md5.txt --force
Code:
.
.
.
.
.
.
.
[s]tatus [p]ause [r]esume [b]ypass [q]uit => s
Session.Name...: cudaHashcat-plus
Status.........: Running
Input.Mode.....: Mask (?1?2?2?2?2?2?2)
Hash.Target....: 52XXX8b6e589XXXaf861ee104baXXX19
Hash.Type......: MD5
Time.Started...: Wed May 1 23:25:05 2013 (2 mins, 47 secs)
Time.Estimated.: Wed May 1 23:36:22 2013 (8 mins, 9 secs)
Speed.GPU.#1...: 205.9M/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 34401157120/134960504832 (25.49%)
Rejected.......: 0/34401157120 (0.00%)
HWMon.GPU.#1...: -1% Util, 59c Temp, -1% Fan
Session.Name...: cudaHashcat-plus
Status.........: Exhausted
Input.Mode.....: Mask (?1?2?2?2?2?2?2)
Hash.Target....: 52028XXXX5898d4aXXX1ee104ba49f19
Hash.Type......: MD5
Time.Started...: Wed May 1 23:25:05 2013 (10 mins, 59 secs)
Time.Estimated.: 0 secs
Speed.GPU.#1...: 205.7M/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 134960504832/134960504832 (100.00%)
Rejected.......: 0/134960504832 (0.00%)
HWMon.GPU.#1...: -1% Util, 45c Temp, -1% Fan
Started: Wed May 1 23:25:05 2013
Stopped: Wed May 1 23:36:25 2013
it must be cracked if your command is cheacking all combinations , yea ?
is it possible to test all combinations `atom` ?
05-01-2013, 10:07 PM
I tried the same hash you had, didn't crack it too, but then i tried it with a other command.
i cracked the hash, using
well, i think there is a difference between using bruteforce only with -a 3 ,
and using it with the mask ?a?a?a?a?a?a (a stands for ?l?u?d?s). i don't know why, but maybe Atom can us say what is here going on.
i cracked the hash, using
Code:
oclHashcat-plus64.exe -a 3 "hash.txt" ?a?a?a?a?a?a
and using it with the mask ?a?a?a?a?a?a (a stands for ?l?u?d?s). i don't know why, but maybe Atom can us say what is here going on.
05-01-2013, 10:52 PM
blind leading the blind.
if you don't specify a mask in mask mode, it uses the default built-in mask, which is almost never what you want.
if all you want to do is incrementally brute force all characters through length 7, you would simply use:
if you don't specify a mask in mask mode, it uses the default built-in mask, which is almost never what you want.
if all you want to do is incrementally brute force all characters through length 7, you would simply use:
Code:
-a 3 -i ?a?a?a?a?a?a?a
05-01-2013, 11:00 PM
And what is the default built-in mask?
05-01-2013, 11:22 PM
last, i knew, it was:
-1 ae10i2onrls938t45m67cdyhubkgpjvfwzAxEILORNSMTCDBqHYKUPGJFVWZXQ
-2 ae10i2onrls938t45m67cdyhubkgpjvfwzxq
-3 ae10i2onrls938t45m67cdyhubkgpjvfwzx._q!-*@
-4 1029384567
?1?2?2?2?2?2?2?3?3?3?3?4?4?4?4
but it may have changed
-1 ae10i2onrls938t45m67cdyhubkgpjvfwzAxEILORNSMTCDBqHYKUPGJFVWZXQ
-2 ae10i2onrls938t45m67cdyhubkgpjvfwzxq
-3 ae10i2onrls938t45m67cdyhubkgpjvfwzx._q!-*@
-4 1029384567
?1?2?2?2?2?2?2?3?3?3?3?4?4?4?4
but it may have changed
05-02-2013, 10:31 AM
(05-01-2013, 10:52 PM)epixoip Wrote: [ -> ]blind leading the blind.
if you don't specify a mask in mask mode, it uses the default built-in mask, which is almost never what you want.
if all you want to do is incrementally brute force all characters through length 7, you would simply use:
Code:-a 3 -i ?a?a?a?a?a?a?a
tnQ epixoip ...
is it possible for my speed to crack this hash ?
_________________________________________________________
for crack a 4lenght pass..
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i --increment-min=1 --increment-max=12 --force
05-02-2013, 02:44 PM
The MD5 hash of "zar2Hh" should be cracked in a short time. For the MD5(unix), it will take much longer (and don't forget to use -m 500 instead of -m 0). It would be easier if you use an adapted mask like ?l?l?l?d?u?l. However in a real case scenario, you don't know that so you go for the highest probabilities, meaning that you start with first letter upper or lower case, followed by a bunch of lowercase letter and maybe finishing by 1-4 numbers.
05-02-2013, 04:55 PM
If you only want to crack one hash, you should use cudaHashcat-lite, that is much faster than normal cudaHashcat-plus, but you can only crack one hash at time. Also, if you want to crack a 4 length password, you don't need 12x ?a, you only need 4x ?a, and the increment things you typed are not really necessary.
The command to brute-force a 4 length password should be
and if you want to crack all possible passwords up to 12 chars(which is really time-consuming with a not specified mask) the command should be
And if you want to crack MD5(unix), you should use -m 500 instead of -m 0, just like mastercracker said.
The command to brute-force a 4 length password should be
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a
Code:
./cudaHashcat-plus64.bin -m 0 -a 3 "/md5.txt" ?a?a?a?a?a?a?a?a?a?a?a?a -i
05-04-2013, 09:43 AM
can we use -m 500 in lite version ?
cause i cant see 500 option in hash mode list in --help .
anyway ... i understand , i cant crack it via one gpu because this md5 type give a heavy work to generate and check. so i must use multi gpus Or use good mask
tanx from all for repling ..
cause i cant see 500 option in hash mode list in --help .
anyway ... i understand , i cant crack it via one gpu because this md5 type give a heavy work to generate and check. so i must use multi gpus Or use good mask
tanx from all for repling ..
Pages: 1 2