The latest oclHashcat-plus-0.07 documentation for this thing is too frustrating, so it's hard to find a valid, recorded
./CudaHashcat-plus32.bin-a 3-m 1000 hash? D? D? D? D? D? D? D? D? D? D? D? D-o log
1./cudaHashcat-plus32.bin-a 3-m 1000 hash? D? D? D? D? D? D? D? D? D? D? D? D-o log
Legacy problems:
1. What are the parameters for a specified character set, such as uppercase/lowercase letters, uppercase/lowercase letters, numbers, uppercase/lowercase letters, numbers, and shift numbers?
2. Specify the password length. For example, if I want to set the password length to less than 15 characters, what are the parameters? Oclhashcat seems to support up to 15-bit passwords.
3. Now ntlm's hash is only the hash part, and the account part does not know how to add it. I have converted it into a format like username: hash, and an error is returned. You need to know that oclhashcat supports the standard ntlm format.
Answer: The-username parameter can be added to support the username: hash format, but the output still does not contain username. There are two methods to achieve the output: username: cracked passwd format.
./CudaHashcat-plus32.bin hashfile.txt-m 1000-r rules/best64.rule example. dict -- username
$ Cut-d': '-f1 cracked.txt | xargs-I {}-xn1 grep {} hashfile.txt
In this example, hashfile.txt is username: hashformat, and cracked.txt is hash: plain format.
123. /cudaHashcat-plus32.bin hashfile.txt-m 1000-r rules/best64.rule example. dict -- username $ cut-d': '-f1 cracked.txt | xargs-I {}-xn1 grep {} hashfile.txt in which hashfile.txt is username: hashformat, and cracked.txt is hash: plain format.
Or use this PHP program to convert
<? Php
Echo ('combining FILES! ');
$ In1 = fopen ("emaihash.txt", "rb ");
$ In2 = fopen ("hashpass.txt", "rb ");
$ Out = fopen ("emailpass.txt", "wb"); // or emailhashpassword.txt
While ($ row = trim (fgets ($ in1 )))
{
List ($ email, $ hash) = preg_split ("~ :~ ", $ Row );
List (, $ pass) = preg_split ("~ :~ ", Trim (fgets ($ in2 )));
Fwrite ($ out, $ email. ":". $ pass. "\ r \ n"); // or fwrite ($ out, $ email. ":". $ hash. ":". $ pass. "\ r \ n ");
}
Fclose ($ in1 );
Fclose ($ in2 );
Fclose ($ out );
?>
123456789101112131415 <? Php echo ('combining FILES! '); $ In1 = fopen ("emaihash.txt", "rb"); $ in2 = fopen ("hashpass.txt", "rb"); $ out = fopen ("emailpass.txt ", "wb"); // or emailhashpassword.txt while ($ row = trim (fgets ($ in1) {list ($ email, $ hash) = preg_split ("~ :~ ", $ Row); list (, $ pass) = preg_split ("~ :~ ", Trim (fgets ($ in2); fwrite ($ out, $ email. ":". $ pass. "\ r \ n"); // or fwrite ($ out, $ email. ":". $ hash. ":". $ pass. "\ r \ n");} fclose ($ in1); fclose ($ in2); fclose ($ out);?>
4. GPU is useless when running NTLM! This is the biggest problem! I suspect that it is not the brute-force mode, but the mask mode. But it is also strange that the CPU only uses 23%.
Pid user pr ni virt res shr s % CPU % mem time + COMMAND
13471 root 15 0 136 m 81 m 31 m S 23.3. 09 cudaHashcat-plu
12 pid user pr ni virt res shr s % CPU % mem time + COMMAND 13471 root 15 0 136 m 81 m 31 m S 23.3 2.8. 09 cudaHashcat-plu
Status ......: Running
Input. Mode...: Mask (? D? D? D? D? D? D? D? D? D? D? D? D)
Hash. Type...: NTLM
Time. Running.: 5 secs
Time. Left...: 8 mins, 17 secs
Time. Util...: 5592.7 ms/250.5 ms Real/CPU, 4.7% idle
Speed ......: 1988.5 M c/s Real, 2106.8 M c/s GPU
Recovered...: 0/850 Digests, 0/1 Salts
Progress...: 11120836608/1000000000000 (1.11%)
Rejected...: 0/11120836608 (0.00%)
HW. Monitor. #1: 0% GPU, 39c Temp
HW. Monitor. #2: 0% GPU, 39c Temp
HW. Monitor. #3: 0% GPU, 32c Temp
[S] tatus [p] ause [r] esume [q] uit =>
From subaozi