Again, thanks for your comments!
"YES" - "Bye!Bye!"...
Please use a small "y"! Because the "ultra-secret"

source code to check your "y" is as follows:
Code: Select all
cVersuch=getchar();
if (cVersuch!=121)
{printf("\n");
printf("Bye!Bye!");
exit(0);}
It asks me for y/YES. I write:
"y" - "Sorry short version!"
This could be caused by the "e"-option being bigger than 16, for instance "e=20". The code is as follows:
Code: Select all
if (size_End>17) { printf("Sorry short version.\n"); return(0);}
(I didn't see much sense in making it bigger as 16, because even with multiple cards, I doubt that you can reach 14-15 with "loweralpha". And it is of course a good idea to start with something like "2004aaaaaaaaaaaa". But if you reach size 16, I would recommend you to find another way to crack that password or to try another password first=> loweralpha 12 takes me 19 hours on a GTX+9800. That means that even a system going 10 times faster, will not be able to reach 14 characters, 1.9 h* 26*26=1284 hours=53 days= your system is on fire)
Still don't work - tried with login:pass with and w/o newline in the end. The same error
Budden, I am very sorry for you! I really had hoped that you wouldn't have had problems again!
What I can assure you, is that it worked for me and for at least another person without any difficulties. Therefore please try the following line and lets hope that it will work for you as well:
"schwarzwaldMYSQL32.exe s=0 e=9 c=loweralpha f=testpasswordsSMALL.txt"
("testpasswordsSMALL.txt" is in the zip!)
If that does not work, please try the same with Xsergs file(I am uploading it with this reply).
PS That key for license agreement is very long & inconvenient - it ould be better to ask it on only the 1st start - and then create some .txt file with word "YES" and if program sees it - it doesn't ask for that key.
Or better without it at all, but if you need it - see earlier.
Right now I am working on an even more powerful, faster version. Personally, I found dozens of system with this hash type. Very often systems which were barely used and where passwords were like "root", "admin" and so on. But then I also got for instance a government website concerning aids and other health issues. Therefore, because that tool is very powerful and because it might allow to crack hashes which were safe before, it is very important to remind people that this is not a game but something real. And that it might have very serious consequences(Maybe we will meet one day. And then I doubt that I would not be willing to give you a "bash version"!

But I can't do that now, sorry!).