Hello forum,
for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)
# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst
How?
Thank you very much!
Joe
(07-23-2022, 02:23 PM)joe123 Wrote: [ -> ]Hello forum,
for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)
# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst
How?
Thank you very much!
Joe
No, it is not possible
->No, it is not possible
I am wondering why.. Would that not be a cool feature?
(07-23-2022, 02:23 PM)joe123 Wrote: [ -> ]Hello forum,
for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)
# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst
How?
Thank you very much!
Joe
Hashcat can't do it, but you could just write a small script that executes the one followed by the other.
(07-23-2022, 02:23 PM)joe123 Wrote: [ -> ]Hello forum,
for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)
# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst
How?
Thank you very much!
Joe
NEVER user --force
also remove the --show because --show will not crack anything, --show is for showing already cracked passwords
the basic command, only things added is -r rules (copy the rules from rules folder) and -O for optimized kernel to speed up things
Code:
hashcat -a0 -m1000 -O --username -r best64.rule hash.txt wordlist.lst
hi forum, ... snoopy,
as mentioned, not to use --force, is tried the following command and got the message (without --force i can't execute any command)
mymask.hcmask (content)
-------------------
?l?u?d#, ?1?1?1?1?1?1?1?1?1?1
$ hashcat -a 3 -m 9400 -o pass.txt htag-hash mymask.hcmask -i --increment-min=6 --session mymask
hashcat (v6.2.5-650-g99be4f9fd) starting
* Device #1: Outdated POCL OpenCL driver detected!
This OpenCL driver may fail kernel compilation or produce false negatives.
We recommend using a version of POCL >= 1.9
You can use --force to override, but do not report related errors.
No devices found/left.
Started: Fri Aug 5 12:19:14 2022
Stopped: Fri Aug 5 12:19:14 2022
help me to resolve the situation. thanks in advance.
Hashcat is telling you exactly what is needing to be done to not have errors.
* Device #1: Outdated POCL OpenCL driver detected!
This OpenCL driver may fail kernel compilation or produce false negatives.
We recommend using a version of POCL >= 1.9
If you don't resolve this issue and use --force you may not even find the password even if it is correctly guessed.