![]() |
Attack succeeds with brute-force, but same attack fails with dictionary - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Attack succeeds with brute-force, but same attack fails with dictionary (/thread-5882.html) |
Attack succeeds with brute-force, but same attack fails with dictionary - Raxtod - 09-16-2016 Hello, I am running into an issue where an IPB2/MyBB hash fails to crack using attack mode 0, but succeeds with attack mode 3. Both attacks should be using the same keyspace, yet only the brute-force method succeeds. I have placed the IPB/MyBB hash in a file called a.hash. Code: hashcat-3.10>more a.hash 2a43909624132cfc594118ec990467da is the hash, aaaaa is the salt, and aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa (32 lowercase a's) is the solution. When I run a brute-force attack: Code: hashcat-3.10>hashcat64 -a 3 -m 2811 a.hash aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa The attack succeeds, and the hash is cracked. Now I have placed the solution in a dictionary file called a.dict. Code: hashcat-3.10>more a.dict Now I remove the pot file and run a dictionary attack using a.dict: Code: hashcat-3.10>hashcat64 -a 0 -m 2811 a.hash a.dict The keyspace was not rejected, so why was the hash not cracked? Have I done something wrong? I've tried burying the correct solution in a much longer dictionary, but the hash still fails to crack. I have tried the same tests using the latest beta version (3.10+131), but the problem persists. RE: Attack succeeds with brute-force, but same attack fails with dictionary - atom - 09-16-2016 I can reproduce this locally, please open a github issue |