I have been trying to brute force a hash using this command but it I gave up once I made it through the 10 character passwords.
E:\Downloads\hashcat-3.10\hashcat64.exe -1 l -2 u -3 d -4 s -a 3 -m 1000 3050296b7190cefb03a9e15dad1fa02a
But, now I think I found a way to crack it as the NTLM hash is split into two string before hashed so if I can find a seven character hash that matches the first part I'll have part of the hash that I can use as a salt. So, I'm pretty sure Hashcat cannot do that, what I want it to do is log all passwords with their hashes so I can search for the first half of the hash.
To clarify, I want to log all the passwords generated in hashcat along with their hashes into a readable file, such as a .txt file.
Sorry if this is unclear.
Edit: I realized this weakness only applies to LM hashes
E:\Downloads\hashcat-3.10\hashcat64.exe -1 l -2 u -3 d -4 s -a 3 -m 1000 3050296b7190cefb03a9e15dad1fa02a
But, now I think I found a way to crack it as the NTLM hash is split into two string before hashed so if I can find a seven character hash that matches the first part I'll have part of the hash that I can use as a salt. So, I'm pretty sure Hashcat cannot do that, what I want it to do is log all passwords with their hashes so I can search for the first half of the hash.
To clarify, I want to log all the passwords generated in hashcat along with their hashes into a readable file, such as a .txt file.
Sorry if this is unclear.
Edit: I realized this weakness only applies to LM hashes