Excel Protected Workbook Known PW Length - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Excel Protected Workbook Known PW Length (/thread-10671.html) |
Excel Protected Workbook Known PW Length - HelmanFrow - 03-19-2022 Hi, first-time listener; first-time caller. I've gone and locked myself out of a spreadsheet. I first ran paid software called PassFab For Excel in trial mode. While I didn't pay to get my results, I did note that the password is four characters long and contains only lower- and upper-case letters (I ran a custom brute-force attack). PassFab For Excel returned the results in about 12 minutes. When I realized that PassFab wanted $20 for my 4-digit password I found JtR. I extracted the file hash using office2john.py (which seems to produce a format that HashCat can use, as well). I tried JtR in default mode but it doesn't recognize my GPU (Quadro M100M) for some reason, even after I edited the nvidia.icd file with the location of nvopencl.dll. Then I found HashCat (which sees my GPU out of the box) and for the last few hours I've been breaking my head over learning the the syntax and I can't figure out which attack to use and how to structure it to search for passwords only 4 characters in length and with the character set I need. It's probably simple enough but I'm a bit slow on the uptake, and now I'm tired and frustrated. Please to help. PS I'm on Windows 10. RE: Excel 2013 Protected Workbook Known PW Length - HelmanFrow - 03-19-2022 I've had JtR running on CPU at about 290 p/s for about 12 hours in default mode but it hasn't found anything yet. I'm hoping things will move along faster on the GPU with HashCat. RE: Excel Protected Workbook Known PW Length - HelmanFrow - 03-19-2022 Actually, upon closer inspection, it looks as though hashcat can't use my GPU yet. I'm in the middle of downloading the CUDA Toolkit in the event that I need to install it. Will I need to install it? RE: Excel Protected Workbook Known PW Length - HelmanFrow - 03-19-2022 Still trying to get HashCat working. Right now it's been stuck on Initializing backend runtime for device #1. Please be patient... for over 20 minutes. I'm not sure if I should cancel or not. RE: Excel Protected Workbook Known PW Length - HelmanFrow - 03-19-2022 I cancelled the hung recovery. Running hashcat.exe -I gives me this: Code: S D:\desktop\hashcat-6.2.5> ./hashcat.exe -I RE: Excel Protected Workbook Known PW Length - HelmanFrow - 03-20-2022 I installed the CUDA toolkit and ran hashcat.exe -I. Now I get this: Code: PS D:\desktop\hashcat-6.2.5> ./hashcat.exe -I Everything looks hunky + dorey but when I try to run a recovery on my file it errors out with this: Code: PS D:\desktop\hashcat-6.2.5> ./hashcat -a 3 -m 9600 --username hash.txt ?l?l?l?l I'm running a Lenovo ThinkPad P50 20EN with Windows 10 21H2. What am I missing? RE: Excel Protected Workbook Known PW Length - HelmanFrow - 03-20-2022 p.s. I accidentally cancelled the JtR session after a fruitless 16 hours and now I'm back at square 1. RE: Excel Protected Workbook Known PW Length - secpro - 03-20-2022 (03-20-2022, 01:50 AM)HelmanFrow Wrote: p.s. I accidentally cancelled the JtR session after a fruitless 16 hours and now I'm back at square 1. Try adding --restore to the command line and it might pick up where it left off. Given a rate of 291/s, trying all uppercase and lowercase letters should take about 7 hours, if I'm doing the math right. Note that hashcat will not make it super obvious when it's found; there won't be a popup or anything. You'll be watching the 0/1 line and see when it changes to 1/1. RE: Excel Protected Workbook Known PW Length - slyexe - 03-20-2022 geezus man, you're pretty impatient. Your first attempt at cracking your password would have been fine if you didn't keep installing drivers ontop of drivers. Just use the damn OpenCL driver that would have worked at square one. Look at the Wiki for your hash. https://hashcat.net/wiki/doku.php?id=example_hashes Now look at how your attack will work. https://hashcat.net/wiki/doku.php?id=mask_attack So you have your hashmode and your attack mode so now you just need to put it all together. hashcat.exe -d 2 -m xxxxx -a 3 -1 ?l?u hash.txt ?1?1?1?1 RE: Excel Protected Workbook Known PW Length - HelmanFrow - 03-20-2022 (03-20-2022, 02:17 AM)slyexe Wrote: geezus man, you're pretty impatient.😂 Guilty as charged, although I'm also tenacious + curious and I have a habit of using threads I've started to keep track of my progress. (03-20-2022, 02:17 AM)slyexe Wrote: Your first attempt at cracking your password would have been fine if you didn't keep installing drivers on top of drivers. Just use the damn OpenCL driver that would have worked at square one. Whoops. In my defense, despite my best efforts I still lack perfect information in every knowledge domain so I may occasionally not realize there is an OpenCL driver. (03-20-2022, 02:17 AM)slyexe Wrote: Look at the Wiki for your hash.Yup, I pored over those pagers for hours. Like I said, I'm a little slow on the uptake. (03-20-2022, 02:17 AM)slyexe Wrote: So you have your hashmode and your attack mode so now you just need to put it all together. Aha. Now I understand the syntax a little better. Anyway, that gets me down to one error code instead of three: Code: PS D:\desktop\hashcat-6.2.5> ./hashcat.exe -d 2 -m9600 -a 3 -1 ?l?u hash.txt ?1?1?1?1 |