![]() |
how to cracked it? SHA-512($salt,$pass) - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: how to cracked it? SHA-512($salt,$pass) (/thread-3360.html) |
how to cracked it? SHA-512($salt,$pass) - secxzone - 05-08-2014 SHA-512($salt,$pass) oclHashcat64.exe --username --remove -o D:\username_hash_pass.txt -m 1720 D:\dic.dic username_hash_pass.txt test123:removed test321:removed ERROR: No hashes loaded what is the correct usage? tanks very much. RE: how to cracked it? SHA-512($salt,$pass) - curlyboi - 05-08-2014 (05-08-2014, 02:01 PM)secxzone Wrote: what is the correct usage? -o specifies output, not input RE: how to cracked it? SHA-512($salt,$pass) - secxzone - 05-08-2014 (05-08-2014, 02:06 PM)curlyboi Wrote:(05-08-2014, 02:01 PM)secxzone Wrote: what is the correct usage? oclHashcat64.exe --username --remove -o D:\success.txt -m 1720 D:\username_hash_pass.txt D:\ dic.dic WARNING: Hashfile 'D:\username_hash_pass.txt' in line 1 PHP Code: a7516439f85ef121da44ce38fc43827232dcbc51f8db2efce2a81478ee79a74dbdd5881236ac50ebddae37fd7b6625c3cc3e2a0639a6e19da68c008a943603e7:a338a0ef20e4d29b703900f7bcb82173cbf03efb19ddc372baa18f952558e77ce16ab88e77c86a1fbf41e082dfe20accd706511a8eacd25b9f35d0375e81f68a why? PHP Code: a7516439f85ef121da44ce38fc43827232dcbc51f8db2efce2a81478ee79a74dbdd5881236ac50ebddae37fd7b6625c3cc3e2a0639a6e19da68c008a943603e7 salt length too long? RE: how to cracked it? SHA-512($salt,$pass) - Xanadrel - 05-08-2014 What about you read the forum rules first : https://hashcat.net/forum/announcement-2.html And then try to actually search : http://hashcat.net/wiki/doku.php?id=oclhashcat#limitations ... |