You question does not make a lot of sense to me. If you already know the hash and know what input generates it, what is the point of your bruteforce?
On the other hand bruteforcing something means to apply some procedure many times with different inputs and comparing the output with your hash. If you do not know what procedure to use, there is no way you will be able to apply it many times.
But if you know the input and the hash, you can bruteforce it in the beginning to find what algorithm is used. For example
sha1(i), sha1(md5(i)), md5(i) and so on trying many combinations of possible hash functions. You might guess partially what is used. So if you output is 160 bits long, you can guess that may be the last step was sha1.