No password candidates received in stdin mode, aborting... - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: No password candidates received in stdin mode, aborting... (/thread-8147.html) Pages:
1
2
|
No password candidates received in stdin mode, aborting... - alexb - 02-13-2019 Hi! i need help. I am trying to crack password windows server 2016 standard. I extract the hash by pwdump7. And using HashcatGUI_1.1beta0 to crack, but i got this message " No password candidates received in stdin mode, aborting..." I google and add more option "--stdin-timeout-abort" i put it in with 300 sec. But it still show same result. If any one know the problem. Here is the command: hashcat64.exe -a 0 --session=2019-02-13 -m 1000 -w 3 -D 1 --status --status-timer=20 --potfile-disable -p : -O --hwmon-disable -o "C:\tmp\123.txt" --outfile-format=1 -g 10000 "C:\tmp\2016S.txt" --stdin-timeout-abort 300 And the result : No password candidates received in stdin mode, aborting... Session..........: 2019-02-13 Status...........: Aborted Hash.Type........: NTLM Hash.Target......: C:\tmp\\2016S.txt Time.Started.....: Wed Feb 13 15:53:58 2019 (5 mins, 6 secs) Time.Estimated...: Wed Feb 13 15:59:04 2019 (0 secs) Guess.Base.......: Pipe Guess.Mod........: Rules (Generated) Speed.#2.........: 0 H/s (0.00ms) @ Accel:1024 Loops:256 Thr:1 Vec:4 Recovered........: 0/4 (0.00%) Digests, 0/1 (0.00%) Salts Progress.........: 0 Rejected.........: 0 Restore.Point....: 0 Restore.Sub.#2...: Salt:0 Amplifier:0-0 Iteration:0-256 Candidates.#2....: [Copying] Started: Wed Feb 13 15:53:54 2019 Stopped: Wed Feb 13 15:59:04 2019 RE: No password candidates received in stdin mode, aborting... - undeath - 02-13-2019 There are lots of options but none of those is a wordlist. RE: No password candidates received in stdin mode, aborting... - alexb - 02-13-2019 (02-13-2019, 12:02 PM)undeath Wrote: There are lots of options but none of those is a wordlist. i did not use wordlist RE: No password candidates received in stdin mode, aborting... - undeath - 02-13-2019 well, that much is clear. But you're running a wordlist attack. RE: No password candidates received in stdin mode, aborting... - royce - 02-13-2019 alexb, to clarify: you've told hashcat that you want to use your own wordlist (-a 0), but you haven't supplied one. RE: No password candidates received in stdin mode, aborting... - alexb - 02-13-2019 (02-13-2019, 12:47 PM)undeath Wrote: well, that much is clear. But you're running a wordlist attack. hi! i did not use wordlist, since it only contain some pass that maybe match with the password. The password i crack is combine of alphabet, number, special key, Uper case , lower case. So, could you give me the full command that is right to run without wordlist. Thanks RE: No password candidates received in stdin mode, aborting... - alexb - 02-13-2019 (02-13-2019, 04:03 PM)royce Wrote: alexb, to clarify: you've told hashcat that you want to use your own wordlist (-a 0), but you haven't supplied one. thanks Royce, i see that RE: No password candidates received in stdin mode, aborting... - atom - 02-13-2019 Please read https://hashcat.net/wiki/doku.php?id=mask_attack it will help you now and in the future RE: No password candidates received in stdin mode, aborting... - undeath - 02-13-2019 Do you know that the password contains all those types of characters? If not, a wordlist attack with one of the larger rules files included in hashcat may do the job. RE: No password candidates received in stdin mode, aborting... - alexb - 02-13-2019 (02-13-2019, 05:20 PM)atom Wrote: Please read https://hashcat.net/wiki/doku.php?id=mask_attack it will help you now and in the future Thanks Atom |