hashcat Forum
Best way to match reused passwords? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Misc (https://hashcat.net/forum/forum-15.html)
+--- Forum: General Talk (https://hashcat.net/forum/forum-33.html)
+--- Thread: Best way to match reused passwords? (/thread-10096.html)



Best way to match reused passwords? - lookinghelp937 - 05-13-2021

Hi everyone sorry if this has been asked before. Chickenman showed a good way of cracking harder hashes by using reused passwords. Ive used the association attack on usernames and now I would like to try and find reused passwords from emails and match them with the new bcrypt hash.

Basically
- have email:hash
- match email with previously leaked password
- copy previous password to new list in password:hash
- then use the password and hash for -a 9 (associated attack)

I tried doing something in awk with the ExploitIN compilation leak but was getting lots of weird returns (99% of lines had no hash/password) and in the end only ended up with around 1000 valid lines (out of 5million)

Does anyone have any resources that might help me?

Thank you!!