Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Brute Force / Mask
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
How do I go about performing a brute / mask attack on a vbulletin hash with one thread that and it tries every password that is from 5 characters to 10 characters long and uses numbers, letters and symbols ?
Hmm, what about reading help and wiki ?
I did but I don't know If im doing the right thing or not.
is this right?
Code:
hashcat-cli64.exe -a 3 --pw-min=5 --pw-max=10 -m 2711 -n 2 -c 64 hash.txt -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1
Yes, you do.
first, you're not going to brute force past length 8 on CPU. you probably won't even get past length 7.
second, you don't need to specify --pw-max
third, -c with -a 3 does nothing
forth, you can replace "-1 ?l?u?d?s ?1" with "?a"

so while your command line works, a more appropriate command line would be:

Code:
hashcat-cli64 -n 2 -m 2711 -a 3 --pw-min 5 hash.txt ?a?a?a?a?a?a?a
(05-15-2013, 05:22 PM)Kuci Wrote: [ -> ]Hmm, what about reading help and wiki ?

(05-16-2013, 02:20 AM)epixoip Wrote: [ -> ]first, you're not going to brute force past length 8 on CPU. you probably won't even get past length 7.
second, you don't need to specify --pw-max
third, -c with -a 3 does nothing
forth, you can replace "-1 ?l?u?d?s ?1" with "?a"

so while your command line works, a more appropriate command line would be:

Code:
hashcat-cli64 -n 2 -m 2711 -a 3 --pw-min 5 hash.txt ?a?a?a?a?a?a?a
Thanks, does this make it more likely to get the password?
Quote:Thanks, does this make it more likely to get the password?
Not at all. If the password is length 8 or more, you won't get it but if it's less than 8, you should crack it if it does not contain regional characters.