Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.
hashcat Forum
how to configure this in OCLhashcat? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: General Help (https://hashcat.net/forum/forum-8.html)
+--- Thread: how to configure this in OCLhashcat? (/thread-1805.html)



how to configure this in OCLhashcat? - xtrusion - 12-04-2012

trying for several hours now to configure the follow sha256 bruteforce

hash: AE13900912E9B41CBD5AC1AF57F8854FD3C4BCC0A22857DCE38A44FBD292BD75
original code: 00000000123456789012

salt: 00000000
password: 123456789012
the password is always nummeric

salt is always the same, password can change, i want to bruteforce the password

I hope someone can give me an example or any directions how to make this over GPU since at the moment i'm a little bit lost to get all the options correct


RE: how to configure this in OCLhashcat? - Rolf - 12-04-2012

This should do it
Quote:cudaHashcat-lite64 -m 1400 AE13900912E9B41CBD5AC1AF57F8854FD3C4BCC0A22857DCE38A44FBD292BD75 00000000?d?d?d?d?d?d?d?d?d?d?d?d



RE: how to configure this in OCLhashcat? - xtrusion - 12-04-2012

Thnx...
worked like a charm.. made some improvements by adding the --pw-min=20 --pw-max=20 since it was starting at pw len 19 Smile


RE: how to configure this in OCLhashcat? - atom - 12-08-2012

While this will work it will run very very very slow because the 4 chars are static. To make any reasonable use of GPU you need to give it some work to run on GPU kernel.

So you better get oclHashcat-plus v0.09 and use the sha256(salt.pass) hash-mode and -a 3 attack-mode and see speed increase by 100-1000 Smile