hashcat Forum
Brute-force $HEX - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Brute-force $HEX (/thread-7895.html)



Brute-force $HEX - fedorov83 - 10-26-2018

Dictionary attack is working with --hex-salt i get correct $HEX[310032003300340035003600] 123456 as result
Code:
hashcat64 -m 160 --hex-salt --encoding-to=utf-16le hash.txt dict.txt
But when i do brute-force with the same hash and salt i get no result, here is my syntax
Code:
hashcat64 hash.txt -m 160 --hex-salt --encoding-to=utf-16le -a 3 -1 ?d ?1?1?1?1?1?1
Is my brute-force syntax wrong cause dictonary is working?


RE: Brute-force $HEX - undeath - 10-26-2018

I'm not entirely sure but I think encoding-from/encoding-to does only work with wordlists.


RE: Brute-force $HEX - fedorov83 - 10-26-2018

Thanks for info. Is there any other way to use brute-force in this case?
Here is an example hash : salt hex password is $HEX[6800610073006800630061007400]  hashcat
Code:
30263e435f8ce1b2fcdb9c559941783e337d2168:548afbb1fff2e98e2483209cf891546db5be25ef04868d2dd7c8c673d6c5826e



RE: Brute-force $HEX - undeath - 10-27-2018

Well, there is no easy way to do so (other than generating the candidates externally and piping them into hashcat which will slow down your attack). You can craft a mask that is using multiple bytes per character manually.