![]() |
PDF 1.4 Password hash cracking - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: PDF 1.4 Password hash cracking (/thread-4816.html) |
PDF 1.4 Password hash cracking - Sheldor - 11-14-2015 Hi, I lost a Password of a important PDF file. At the moment I am trying to recover the Password with this Parameter: Quote:cudaHashcat64.exe -m 10500 -a myHash.txt -a 3 ?b?b?b?b?bI am not sure if the Parameter are so right. The Password can be any characters ans the password is 8-12 characters long. My GPU is a GTX 970 Are the Parameter so fine? Thank you RE: PDF 1.4 Password hash cracking - Mem5 - 11-14-2015 Quote:cudaHashcat64.exe -m 10500 -a myHash.txt -a 3 ?b?b?b?b?b - You have twice "-a" - ?b 5 times means 5 characters RE: PDF 1.4 Password hash cracking - Sheldor - 11-14-2015 the "-a" is a copy&paste error. Sorry for that When I have a Password with 12 characters so I use "cudaHashcat64.exe -m 10500 -a myHash.txt -a 3 ?b?b?b?b?b?b?b?b?b?b?b?b"?? But I get this "error": ATTENTION! The wordlist or mask you are using is too small. Therefore, oclHashcat is unable to utilize the full parallelization power of your GPU(s). The cracking speed will drop. Workaround: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_to_create_more_work_for_full_speed INFO: approaching final keyspace, workload adjusted RE: PDF 1.4 Password hash cracking - Mem5 - 11-14-2015 https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#why_should_i_use_a_mask_attack_i_just_want_to_brute_these_hashes --increment: enable incremental mode (see #1 above) --increment-min 4: set the minimum length of the password candidates to 4 (in this case) --increment-max 6: set the maximum length of the password candidates to 6 (in this case) Builtin charset : ?a = ?l?u?d?s ?b = 0x00 - 0xff You may not need ?b.. RE: PDF 1.4 Password hash cracking - rico - 11-14-2015 Your command doesn't really matter. The GTX 970 benchmarks at about 7800 kH/s for this hash type so even just 8 character passwords including all characters is 95^8 combinations. It will take almost 30 years to try all 8 char combinations on the 970. 9 chars will take two and a half millennia... Maybe a nice dictionary attack might be better (unless passwords are randomly generated). RE: PDF 1.4 Password hash cracking - epixoip - 11-15-2015 The reason why you are getting "mask too small" is because of integer overflow. 255^12 > 2^63. RE: PDF 1.4 Password hash cracking - Sheldor - 11-16-2015 Thanks for the answers. Now I am trying to get the PW whit a word list The comant is: Quote:cudaHashcat64.exe cudaHashcat64.exe -m 10500 -a 0 -o GotIT.txt myhash.txt final-wordlist.txt but I get this Error: Quote:... RE: PDF 1.4 Password hash cracking - rico - 11-16-2015 You have only one GTX 970, not two, so only run one cudaHashcat64.exe, not two. Change this: cudaHashcat64.exe cudaHashcat64.exe -m 10500 -a 0 -o GotIT.txt myhash.txt final-wordlist.txt To this: cudaHashcat64.exe -m 10500 -a 0 -o GotIT.txt myhash.txt final-wordlist.txt |