Help with Russian again - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: Help with Russian again (/thread-2016.html) Pages:
1
2
|
Help with Russian again - mastercracker - 01-30-2013 This is a follow up on the following thread which was closed: http://hashcat.net/forum/thread-1204.html So here's the hash:pass in question (from the mentioned post, not real user data): 507620db658a3d55c367cc8273e2ee24:ьфдщн I was able to crack the hash using the password in a dictionary (UTF8 format) but when I try to crack it via bruteforce, it does not work. Here's the command line I use Hashcat-cli64 -a 3 -m 0 hash.txt ?R?R?R?R?R Is it me or it's not working for other people as well. Waiting for this to create a trac. RE: Help with Russian again - epixoip - 01-30-2013 this is because ?R is ISO-8859-5 and your characters are UTF-8. different byte sequences. RE: Help with Russian again - mastercracker - 01-30-2013 (01-30-2013, 04:20 PM)epixoip Wrote: this is because ?R is ISO-8859-5 and your characters are UTF-8. different byte sequences.But the ?R charset was meant to be able to crack Russian password, no? Are you saying that it's possible to write the same characters using ISO-8859-5, generate an MD5 hash and that this MD5 hash would be different from 507620db658a3d55c367cc8273e2ee24? RE: Help with Russian again - undeath - 01-30-2013 > echo -n ьфдщн | md5sum 507620db658a3d55c367cc8273e2ee24 - > echo -n ьфдщн | iconv -f UTF-8 -t ISO-8859-5 | md5sum 6cda8fbf4ea51d58118e440e1cc478e4 RE: Help with Russian again - mastercracker - 01-30-2013 Thanks epixoip and undeath. Now I am getting it. These 3 MD5 hashes represent the same Russian password but with different encodings: 714d5bc5daad4412e118d1bfd0c7477b Cyrillic windows 1251 507620db658a3d55c367cc8273e2ee24 UTF8 6cda8fbf4ea51d58118e440e1cc478e4 - ISO-8859-5 In order to crack these passwords you need to know the exact system's encoding. Now, I have to check something. If I am not mistaken, we can load charset from files for some Hashcat products. Which one(s) is the question. RE: Help with Russian again - Rolf - 01-30-2013 I've never seen passwords in that ISO-8859-5 encoding, Russian versions of Windows use 1251. RE: Help with Russian again - epixoip - 01-31-2013 good feedback. i can't think of a solution for mask attacks off hand, but if you have russian wordlists in utf8 you can prepare them for use with hashcat with ''iconv -t WINDOWS-1251 wordlist >wordlist.1251'', or pipe ''iconv -t WINDOWS-1251 wordlist'' into hashcat via stdin. RE: Help with Russian again - epixoip - 01-31-2013 Code: epixoip@ike:~$ echo -n ьфдщн | iconv -f UTF-8 -t ISO-8859-5 | hexdump actually it looks like with windows-1251, all of the characters are essentially iso-8859 + 0x10. so you can build a mask attack using hex charset. RE: Help with Russian again - atom - 01-31-2013 Btw, all hashcat version support charset files. But they must been encoded with a 8 bit based encoding. That is ISO-8859-5 and windows-1251. Just enter all the chars you like in a charset and save it with the corresponding encoding, then do -1 mycharset.chr RE: Help with Russian again - mastercracker - 01-31-2013 Interesting. Putting all the characters in a charset file that was Windows-1251 encoded and using the -1 russian.charset, cracked both the hash generated by windows-1251 encoding and the ISO-8859-5 one. Now what should be the equivalent encoding for German and French. |