Correct cmd for 7z file using brute force - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Correct cmd for 7z file using brute force (/thread-7039.html) |
Correct cmd for 7z file using brute force - jillbrooke - 11-22-2017 Howdy I am trying to recover the password for a 7z file that I lost the pwd for. I am not using a wordlist. I have to specify upper case, lower case numbers and several symbols such as ! or @, etc. I've tried running this cmd and I know it's wrong. can anyone help me? I've read several threads, examples, and I'm not sure how to specify the right charset. The password might be 9 characters long and I can't remember any parts of it. /hashcat -a 3 -m 11600 mfilehash.txt To get the hash for the file I used 7z2hashcat Is that the best option? The file is large and I really need to recover it. Thx to everyone in advance! RE: Correct cmd for 7z file using brute force - undeath - 11-22-2017 (11-22-2017, 06:19 AM)jillbrooke Wrote: The password might be 9 characters long and I can't remember any parts of it. You're not going to recover it during your lifetime. |