Maskprocessor | Hashcat syntax question - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip (https://hashcat.net/forum/forum-28.html) +--- Thread: Maskprocessor | Hashcat syntax question (/thread-9003.html) |
Maskprocessor | Hashcat syntax question - blades1000 - 02-29-2020 Hi, Thanks in advance for any help with this. I'm very new to Hashcat and playing around with my gear cracking hashes. I regularly get the message about 'creating more work....parallelization power'. So tonight I tried to get the maskprocessor command working, but no luck. Gear = Win10, GTX 980Ti I've read through the doc's, the forum and I don't have the know how to get it going. This is the command I've tried: Code: ..\maskprocessor-0.73\mp64.exe -i 7:20 ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a | hashcat64.exe -m0 -O --status .\HASHES\unfound.txt -o Found.txt This command runs, but my Speed drops down to 427 kH/s and in the Candidates: *(RT -> -K$% This makes me feel like it's only throwing 4 digit passwords at the hash, when in fact it should be starting with 7 digit candidates? Whereas, my previous command: Code: hashcat64.exe -m0 -a3 -O --status --increment --increment-min 7 --increment-max 20 .\HASHES\unfound.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a -o Found.txt I thought by running an mp and pipe, that I might be able to improve my results. Or am I just reading it all wrong So my questions are, should I be using an mp and pipe (faster results)? What would the correct syntax? Basically trying to brute force passwords between 7 - 20 digits on an MD5 hash. Thanks again RE: Maskprocessor | Hashcat syntax question - philsmd - 02-29-2020 no, you do NOT need maskprocessor in that specific situation (already a huge keyspace/mask). you could improve speed by adding -w 3 or even -w 4 to your command line RE: Maskprocessor | Hashcat syntax question - blades1000 - 02-29-2020 Hi Phil - thanks very much for the reply & advice. How small a keyspace would you recommend before a mp would help? The reason I ask is I have a different set of hashes (34) that I've been able to get 'some' passwords for, but it's only a handful of words to use. For example:
Code: hashcat64.exe --force -m9600 --status -w4 -O -o found.txt --remove --potfile-disable -r .\rules\OneRuleToRuleThemAll.rule HashesReduced.txt ".\Dictionary Files\PrePasswords.txt" I made a mask using another tool I found that analysed this list of passwords and created the following mask file: Code: ?d?d?d?d?d?d But this too was going to take a long time to run. Would you suggest a mp on either of those scenarios? Thank again |