11-09-2018, 09:39 AM
11-09-2018, 12:20 PM
Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.
11-09-2018, 08:57 PM
(11-09-2018, 12:20 PM)undeath Wrote: [ -> ]Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.
Please can u give an example ?
i'm new at cracking stuff
This is function of javascript
**
function doLogin() {
document.sendin.username.value = document.login.username.value;
document.sendin.password.value = hexMD5('\103' + document.login.password.value + '\023\057\006\061\107\252\031\022\337\206\115\266\027\310\002\117');
document.sendin.submit();
return false;
**
11-09-2018, 10:21 PM
i got it
i'm trying attack with mask-bruteforce but i cant add "\" to mask it doesnt crack
example hashcat -a ..... \125?d?d?d?d its giving wrong plain i guess?
but for example /125?d?d?d that is working
i'm trying attack with mask-bruteforce but i cant add "\" to mask it doesnt crack
example hashcat -a ..... \125?d?d?d?d its giving wrong plain i guess?
but for example /125?d?d?d that is working
11-10-2018, 02:42 AM
I solved it
solution : i changed linux OS to windows and its worked
solution : i changed linux OS to windows and its worked
11-11-2018, 03:25 PM
That should be irrelevant. Only how special characters (like "?") are escaped on the OS-native command line (not a hashcat issue) should vary between the platforms.