09-14-2016, 07:14 PM
I'm trying to crack a hash of a switch user HP 5800, because someone have put a password on the boot rom and nobody have this password.
So i have researched in some sites and they say that this switch uses MD5 or SHA1 on the passwords. I have tried some options but till now no success, can anybody help me?
Here are some more informations:
C:\Users\xxx\Desktop\hashcat-3.10>hashcat64.exe -m 0 -a 3 hash.txt
hashcat (v3.10) starting...
WARNING: Hashfile 'hash.txt' on line 1 (xxxxxx): Line-length exception
WARNING: Hashfile 'hash.txt' on line 2 (xxxxxx): Line-length exception
Parsed Hashes: 2/2 (100.00%)
ERROR: No hashes loaded
I have tried m equals to:
0
100
10
20
30
50
150
500
So i have researched in some sites and they say that this switch uses MD5 or SHA1 on the passwords. I have tried some options but till now no success, can anybody help me?
Here are some more informations:
C:\Users\xxx\Desktop\hashcat-3.10>hashcat64.exe -m 0 -a 3 hash.txt
hashcat (v3.10) starting...
WARNING: Hashfile 'hash.txt' on line 1 (xxxxxx): Line-length exception
WARNING: Hashfile 'hash.txt' on line 2 (xxxxxx): Line-length exception
Parsed Hashes: 2/2 (100.00%)
ERROR: No hashes loaded
I have tried m equals to:
0
100
10
20
30
50
150
500