Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.
hashcat Forum
how to configure this in OCLhashcat? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: General Help (https://hashcat.net/forum/forum-8.html)
+--- Thread: how to configure this in OCLhashcat? (/thread-1805.html)



how to configure this in OCLhashcat? - xtrusion - 12-04-2012

trying for several hours now to configure the follow sha256 bruteforce

hash: AE13900912E9B41CBD5AC1AF57F8854FD3C4BCC0A22857DCE38A44FBD292BD75
original code: 00000000123456789012

salt: 00000000
password: 123456789012
the password is always nummeric

salt is always the same, password can change, i want to bruteforce the password

I hope someone can give me an example or any directions how to make this over GPU since at the moment i'm a little bit lost to get all the options correct


RE: how to configure this in OCLhashcat? - Rolf - 12-04-2012

This should do it
Quote:cudaHashcat-lite64 -m 1400 AE13900912E9B41CBD5AC1AF57F8854FD3C4BCC0A22857DCE38A44FBD292BD75 00000000?d?d?d?d?d?d?d?d?d?d?d?d



RE: how to configure this in OCLhashcat? - xtrusion - 12-04-2012

Thnx...
worked like a charm.. made some improvements by adding the --pw-min=20 --pw-max=20 since it was starting at pw len 19 Smile


RE: how to configure this in OCLhashcat? - atom - 12-08-2012

While this will work it will run very very very slow because the 4 chars are static. To make any reasonable use of GPU you need to give it some work to run on GPU kernel.

So you better get oclHashcat-plus v0.09 and use the sha256(salt.pass) hash-mode and -a 3 attack-mode and see speed increase by 100-1000 Smile