What rules for this possible password ? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: What rules for this possible password ? (/thread-11010.html) |
What rules for this possible password ? - lionbladerunner - 09-11-2022 Hello guys, So I have this old Word 2003 file that I forgot the password of. The 2 good news are :
The 2 bad news are :
That's for the last point that I could really use your help guys. I know the password is probably a combination of 2 words among 4, let's say :
Each of those words probably start with a capital letter, but maybe not. And :
Now the 1 million $ question : how do you setup an attack that smartly manage these parameters to make it feasible to recover the password ? RE: What rules for this possible password ? - walterlacka - 09-11-2022 This should help... https://hashcat.net/forum/thread-3665-post-20935.html Using this method, you don't even have to use the actual password to open the file. RE: What rules for this possible password ? - lionbladerunner - 09-11-2022 (09-11-2022, 12:57 PM)walterlacka Wrote: This should help... Thanks for the suggestion ! Unfortunately I tried the first step and it didn't work : Quote:hashcat -m 9800 hash -a 3 ?b?b?b?b?b -w 3 --potfile-disable I first tried to crack the file with Advanced Office Password Recovery from ElcomSoft since they say they can crack a Word 2003 file in seconds no matter the password, but it doesn't work on my file. AOPR says "This file is encrypted by a Cryptographic Service Provider (CSP).", so it seems that a stronger encryption than the standard of Word 2003 was used on this file. (The file was created in 2005 and used a European version of Word 2003). So I guess I can't use this option, and that I need to recover the original password. So I'm back to my original question : does someone have an idea on what rule I can create ? RE: What rules for this possible password ? - lionbladerunner - 09-11-2022 (Update : I guess the problem with the https://hashcat.net/forum/thread-3665-post-20935.html method is that it works for MD5 + RC4 Office 2003 documents (hash type 9700) while my document is SHA1 + RC4 (hash type 9800) ) RE: What rules for this possible password ? - lionbladerunner - 09-17-2022 So, is my problem too complicated to setup an attack ? Should I do 2 lists of the possible words with the different numbers and special characters, and ask hashcat to combine them for an attack ? RE: What rules for this possible password ? - IamYourLeader - 10-08-2022 This is how I would do it.. I used this method to recover my bitcoin wallet , I knew parts of the passwords that I used but couldn't remember in what order and a few other things.. grab yourself Prince Processor: https://github.com/hashcat/princeprocessor We are going to use Prince to generate all our combinations and feed them into Hashcat.. This is my example that worked.. pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0 -m 11300 -w 4 -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 "C:\temp\YOUR-Hash-File.txt" wordlist.txt ( all of parts of the password, include cas sensitve ones as well, or even parts of it) orange Orange Apple apple Pear pear _ _ 31444 45333 --elem-cnt-min=4 --elem-cnt-max=8 min=4 means it will combine 4 of those words to produce a result and max of 8 combinations.. OrangeApple_31444 ( 4 combos) OrangeOrangeOrangeAppleAppple ( 5 combos) it will try every permutation, the smaller the list and the lower the MAX value the quicker it will run through every combinations. If it gets too large then it will take forever and a day.. You can also combine RULES, Case or UPPER all words, toggles , duplicate, reverse, insert specific characters, what ever you want.. eg: pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0 -m 11300 -w 4 -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 -r "c:\temp\customRULES.rule" C:\temp\YOUR-Hash-File.txt" depending on your OS you might not need to use the " ".. I'm on Windoze RE: What rules for this possible password ? - lionbladerunner - 10-16-2022 Thanks IamYourLeader, I will try that RE: What rules for this possible password ? - lionbladerunner - 10-16-2022 (09-11-2022, 03:12 PM)lionbladerunner Wrote: (Update : I guess the problem with the https://hashcat.net/forum/thread-3665-post-20935.html method is that it works for MD5 + RC4 Office 2003 documents (hash type 9700) while my document is SHA1 + RC4 (hash type 9800) ) An update on this : after carefully reading the whole post https://hashcat.net/forum/thread-3665-post-20935.html the method of colliding the passwords DOES work with SHA1 + RC4, but only if the RC4 key is of 40 bits length. It is the case for $oldoffice $1 $2 and $3, but not $4 (the type of my document), which uses a 128 bits length. RE: What rules for this possible password ? - lschroeder - 05-16-2023 Many thanks; this will work. I was just wondering whether there were any parsing options in hashcat that I was simply overlooking or if we had to do it ourselves. |