Brute-force $HEX - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Brute-force $HEX (/thread-7895.html) |
Brute-force $HEX - fedorov83 - 10-26-2018 Dictionary attack is working with --hex-salt i get correct $HEX[310032003300340035003600] 123456 as result Code: hashcat64 -m 160 --hex-salt --encoding-to=utf-16le hash.txt dict.txt Code: hashcat64 hash.txt -m 160 --hex-salt --encoding-to=utf-16le -a 3 -1 ?d ?1?1?1?1?1?1 RE: Brute-force $HEX - undeath - 10-26-2018 I'm not entirely sure but I think encoding-from/encoding-to does only work with wordlists. RE: Brute-force $HEX - fedorov83 - 10-26-2018 Thanks for info. Is there any other way to use brute-force in this case? Here is an example hash : salt hex password is $HEX[6800610073006800630061007400] hashcat Code: 30263e435f8ce1b2fcdb9c559941783e337d2168:548afbb1fff2e98e2483209cf891546db5be25ef04868d2dd7c8c673d6c5826e RE: Brute-force $HEX - undeath - 10-27-2018 Well, there is no easy way to do so (other than generating the candidates externally and piping them into hashcat which will slow down your attack). You can craft a mask that is using multiple bytes per character manually. |