![]() |
Best way to match reused passwords? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: Best way to match reused passwords? (/thread-10096.html) |
Best way to match reused passwords? - lookinghelp937 - 05-13-2021 Hi everyone sorry if this has been asked before. Chickenman showed a good way of cracking harder hashes by using reused passwords. Ive used the association attack on usernames and now I would like to try and find reused passwords from emails and match them with the new bcrypt hash. Basically - have email:hash - match email with previously leaked password - copy previous password to new list in password:hash - then use the password and hash for -a 9 (associated attack) I tried doing something in awk with the ExploitIN compilation leak but was getting lots of weird returns (99% of lines had no hash/password) and in the end only ended up with around 1000 valid lines (out of 5million) Does anyone have any resources that might help me? Thank you!! |