Opprinnelig postet av meitemark
zyrtec: hvordan?
http://mdcrack.df.ru/index2.html#Usage
(C3rb3r)# mdcrack -h
~ ~ ~~~ ~~ ~~~ ~~~ ~~ ~ ~
/| | | ) __| | /
| || | | | | | / | | | | \
| | ___/ __/ | \ | | __/ | \ 1.2
MDCrack version 1.2
( Bruteforce your hashes )
Usage: MDCrack [-h] [-r] [-d] [-W file -R file -F] [-t secs] [-v | -V] [-b string] [-e string] [-a] [-S size] [-s charset] [-M MD4/MD5/NTLM1] [digest]
-h : (h)elp, this text.
-r : give (r)elease number.
-d : (d)elete any resume-file.
-W : file where to (W)rite all computed hashes.
-R : file where to (R)ead precomputed hashes from.
-F : (F)ast write (Hashes file is no longer human readable).
-t : set benchmark mode (t)imer to secs seconds.
-v : set (v)erbose mode.
-V : more (V)erbose.
-b : passwords (b)egin with string.
-e : passwords (e)nd with string.
-a : find (a)ll collisions (won't stop to the first found).
-S : minimal passwords (S)ize to start with.
-s : feed a custom charset (s)tring for passwords.
-M : choose (M)D5, MD4 or NTLM1 algorithm.
No option at all will force mdcrack to resume a previously stopped session.
Author: Gregory Duchemin
Email:
c3rb3r@hotmail.com
WWW:
http://mdcrack.multimania.com
Credit to Simeon Pilgrim for his fast MD5 algorithm.
*******************************************
derived from the RSA Data Security Inc.
MD5 Message-Digest Algorithm
*******************************************
(C3rb3r)#
feks:
C
Mhhmm\crack>mdcrack -M Rhombur b319daf25162ba3e31e6fc6a82a9ddfe
<<System>> MDcrack v1.2 is starting.
<<System>> Using default charset : abcdefghijklmnopqrstuvwxyz0123456789ABCDEF
JKLMNOPQRSTUWXYZ
<<System>> Max pass size = 12 >> Entering MD5 Core 1.
Password size: 1
Password size: 2
Password size: 3
Password size: 4
----------------------------------------
Collision found ! => bka3 <-- passordet funnet
Collision(s) tested : 6694824 in 1 second(s), 582 millisec, 0 microsec.
Average of 4231873.5 hashes/sec.
Visst noen vet hvordan du sjekker en hel liste på en gang så si fra