Exfiltration of target material - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Exfiltration of target material (/thread-8724.html) |
Exfiltration of target material - john_alan - 10-17-2019 Is there documentation on how to appropriately exfiltrate target hash/material for the various supported types? I.e. how to prep MS docs to obtain hash data or Apple notes, or various FDE schemes? Thanks 😊 RE: Exfiltration of target material - philsmd - 10-17-2019 office2john.py 7z2hashcat.py blockchain2john.py bitcoin2john.py 1password2john.py itunes_backup2hashcat.pl etc it depends on your hash type they can be found on the internet very easily (just search for what you are looking for, example hashes are here https://hashcat.net/wiki/example_hashes) RE: Exfiltration of target material - john_alan - 10-17-2019 (10-17-2019, 08:49 PM)philsmd Wrote: office2john.py Thanks Phil, I am experienced with JTR. But aren’t these JTR scripts? Isn’t there an equivalent for Hashcat? Is JTR what folks use? RE: Exfiltration of target material - philsmd - 10-17-2019 wherever possible it makes sense to not invent a new hash format. so it makes sense to use the same signature and data parts/salts etc in the hashcat format like in the jtr format. it doesn't make sense to reinvent the wheel here |