Input and Output user/email:pass - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Input and Output user/email:pass (/thread-7793.html) |
Input and Output user/email:pass - gnubie - 09-07-2018 Okay so i have 2 issues, first of all i want to crack hashes directly from a user:hash or email:hash Im doing some test and... seems like hashcat detects the user or email also like the hash, and it says Code: C:Wordlist\hashcat-4.2.1>hashcat64 -m 0 hash.txt dictonary.txt The 3 hashes are created by me, obviusly inside wordlist there are the specific passwords, im just testing. if i just delete te "user1:" " "user2:" "user3:" then hashcat works. Code: 202cb962ac59075b964b07152d234b70:123 What i need help is to directly crack the hashes from user/email:hash and the output be each user/email with each decrypted pass. Possible? RE: Input and Output user/email:pass - royce - 09-07-2018 Code: $ hashcat --help | egrep -i user ... and: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword RE: Input and Output user/email:pass - gnubie - 09-07-2018 (09-07-2018, 06:17 PM)royce Wrote: Yeah but i have first need to crack hashes and after i get the user:pass decrypted My intention is to do in several servers, and rsync all hashcat file to my raspberry external USB(for continue the cracking, in another server, like having backups you know? so i dont loose anything) , so, if i setup a crontab thath every minute run these would i have a output file updated every min with user:pass format? and these will cause to stop the hash cracking? (im pretty new to hashcat, just saying) Crontab Job: * * * * * ./home/user/hashcatdir/hashcat64.bin -m 0 --username --potfile-path md5.pot --show -o formatted_output.txt --outfile-format 2 original_MD5_hashes.txt RE: Input and Output user/email:pass - gnubie - 09-08-2018 And what about cracking from hashcat with format user:email:hash ? its possible? RE: Input and Output user/email:pass - undeath - 09-08-2018 no RE: Input and Output user/email:pass - royce - 09-08-2018 I guess you could simulate it by replacing the first colon with some other separator, as in user$email:hash RE: Input and Output user/email:pass - gnubie - 09-08-2018 (09-08-2018, 04:15 PM)royce Wrote: I guess you could simulate it by replacing the first colon with some other separator, as in thanks, what about the crontab idea? or any idea for get the user:cracked password every minute so i can rsync to my rasp the cracked results in user:pass ? RE: Input and Output user/email:pass - gnubie - 09-08-2018 I format in user$$$$email:hash and i get the token lenght exception. RE: Input and Output user/email:pass - gnubie - 09-08-2018 When i crack with user:pass i get some lines with token length exeption cause they are some in bad format(around 200 from 27 million) but when i try user$$$$email:hash i get every line with token lenght exception |