hashcat Forum
Correct cmd for 7z file using brute force - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Correct cmd for 7z file using brute force (/thread-7039.html)



Correct cmd for 7z file using brute force - jillbrooke - 11-22-2017

Howdy
I am trying to recover the password for a 7z file that I lost the pwd for.

I am not using a wordlist. 

I have to specify upper case, lower case numbers and several symbols such as ! or @, etc. 

I've tried running this cmd and I know it's wrong. can anyone help me? I've read several threads, examples, and I'm not sure how to specify the right charset. The password might be 9 characters long and I can't remember any parts of it. 

/hashcat -a 3 -m 11600 mfilehash.txt 

To get the hash for the file I used 7z2hashcat

Is that the best option? The file is large and I really need to recover it. 

Thx to everyone in advance!


RE: Correct cmd for 7z file using brute force - undeath - 11-22-2017

(11-22-2017, 06:19 AM)jillbrooke Wrote: The password might be 9 characters long and I can't remember any parts of it.

You're not going to recover it during your lifetime.