Hashcat Dictionairy Cache Hit - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Hashcat Dictionairy Cache Hit (/thread-9416.html) |
Hashcat Dictionairy Cache Hit - poopybrown - 07-28-2020 Hello! I would greatly appreciate your help as I am sure you are much more knowledgeable about this than me. Hashcat has not been working for me for a while as I constantly receive a "dictionary cache hit" message as soon as hashcat starts running. I am not able to crack even the simple md5sum for "password". When running the command as shown below, rockyou.txt exhausts after 20 seconds of running which is ridiculously fast for my specs. hashcat -m 0 hash /usr/share/wordlists/rockyou.txt Host memory required for this attack: 64 MB Dictionary cache hit: * Filename..: /usr/share/wordlists/rockyou.txt * Passwords.: 14344385 * Bytes.....: 139921507 * Keyspace..: 14344385 [s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => Session..........: hashcat Status...........: Exhausted Hash.Name........: MD5 Hash.Target......: 286755fad04869ca523320acce0dc6a4 Time.Started.....: Mon Jul 27 21:07:33 2020 (17 secs) Time.Estimated...: Mon Jul 27 21:07:50 2020 (0 secs) Guess.Base.......: File (/usr/share/wordlists/rockyou.txt) Guess.Queue......: 1/1 (100.00%) Speed.#1.........: 809.3 kH/s (1.00ms) @ Accel:1024 Loops:1 Thr:1 Vec:8 Recovered........: 0/1 (0.00%) Digests Progress.........: 14344385/14344385 (100.00%) Rejected.........: 3094/14344385 (0.02%) Restore.Point....: 14344385/14344385 (100.00%) Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1 Candidates.#1....: $HEX[21217265626f756e642121] -> $HEX[042a0337c2a156616d6f732103] Started: Mon Jul 27 21:06:02 2020 Stopped: Mon Jul 27 21:07:51 2020 I'd sincerely appreciate any insight into this. Thank you so much! RE: Hashcat Dictionairy Cache Hit - royce - 07-28-2020 You're cracking "password\n", not "password": Code: $ echo -n 'password' | md5sum Most passwords are stored without trailing linefeeds. It looks like you may have generated the hash yourself on the command line? Welcome the club. We all did it at some point. RE: Hashcat Dictionairy Cache Hit - poopybrown - 07-28-2020 Oh man this is embarrassing. I really appreciate your help as I have been scratching my head on this for a while! All the best! |