hashcat Forum
PBKDF2-SHA512 (Hash type 7100) Command Syntax - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: PBKDF2-SHA512 (Hash type 7100) Command Syntax (/thread-6622.html)



PBKDF2-SHA512 (Hash type 7100) Command Syntax - frameshift6283 - 06-05-2017

I'm a very new user of Hashcat and I'm trying to use it for hash type 7100 (PBKDF2-SHA512) in order to recover an administrator password on my Mac running OSX El Capitan.

I followed the instructions of the top post here, and I have a hash.txt file of this format: $ml$<iterations(integer)>$<salt(hex)>$<entropy(hex)>.  I have placed this file in the hashcat folder on my PC.

Sorry if this is a very basic question, but how would you format the command in command prompt to perform a dictionary attack based on the information in the hash file? (Assuming I have a wordlist.) The answer on the StackExchange forum only had a brute force attack shown as an example, and even that didn't work when I tried to run it ( hashcat64.exe -m 7100 hash.txt -a 3 ?d?d?d?d ) .

The reason I'm trying to do a dictionary attack is because the password is up to 12 characters long.

Thanks for any help!


RE: PBKDF2-SHA512 (Hash type 7100) Command Syntax - royce - 06-05-2017

Attack mode '0' (-a 0) is the "straight" / dictionary attack.

Running

Code:
hashcat --help

... at the bottom, you'll see an example:

Code:
Wordlist         | $P$   | hashcat -a 0 -m 400 example400.hash example.dict