Posts: 1
Threads: 1
Joined: Feb 2023
Got the hash file using John the Ripper zip2john >hash.txt. File is really big - 78mb. I figured I'd try cracking with my gpu, as my (weaker) laptop using JtR has been trying for a few days now.
Running the line: hashcat -m 11600 -a3 lockedhash.txt
I get the message:
Counted lines in lockedhash.txt
Oversized line detected! Truncated 78628551 bytes
Followed by:
No hashes loaded
Is there anyway to extend the "oversized line detected" issue?
I'm still quite new to this, so apologies if it's a noob question.
Any help is appreciated, thanks.
Capture.PNG (Size: 38.77 KB / Downloads: 6)
Posts: 385
Threads: 1
Joined: Aug 2020
Your hash is probably not supported past hashcat and you need to use john the ripper to break it.
Posts: 28
Threads: 8
Joined: Dec 2022
(02-19-2023, 08:02 PM)lotsofarms Wrote: Got the hash file using John the Ripper zip2john >hash.txt. File is really big - 78mb. I figured I'd try cracking with my gpu, as my (weaker) laptop using JtR has been trying for a few days now.
Running the line: hashcat -m 11600 -a3 lockedhash.txt
I get the message: Counted lines in lockedhash.txt
Oversized line detected! Truncated 78628551 bytes
Followed by: No hashes loaded
Is there anyway to extend the "oversized line detected" issue?
I'm still quite new to this, so apologies if it's a noob question.
Any help is appreciated, thanks.
I think you are doing it wrong. The code -m 11600 is for 7Zip. You need to use 7z2john.pl.
To test it, I created a 7zip with a password:
Then I run the 7z2john.pl to extract the hash with john the ripper.
Code:
perl 7z2john.pl teste.7z
teste.7z:$7z$0$19$0$$16$1122ce245f01bb64efb1d518b4081609$2731776037$160$154$fbe36a7f5d91fc7156607cbcf3c64b2ef3be230d14502f05b9e0153c03d2df6d82d08f50bbc42c2fd03ce5ea47dffd831e933a8f0f62592b80ccc2af05ed3b97c5be4a249c4123492298e4c75b7542fe9b0710fc84e7d2a3fc465454f219739b242b8f362d2ab034da3f9a701e0896fa29aa0281c111e955423ec238fdd995985a8cd066234ba802063e0bc568d5a8f2a20eacaba9bf9351b759968bd69f4f21
Just remove the filename
teste.7z: and save in a file.
Now run the code and find the password:
Code:
hashcat.exe -O -w 3 -m 11600 -a 3 7zip.txt --potfile-disable ?l?l
Maybe you are using the wrong code to extract the hash of the file. Was it
13600 - WinZip ?? You can create a test file like I did and test youself if it work. Then, try with your file!