Recover passwords in output user:plain - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: Recover passwords in output user:plain (/thread-985.html) |
Recover passwords in output user:plain - ABC - 03-14-2012 Dear well respected hashcat community members, I've made a list of hashed passwords in email:hash form that I'd like to recover. Example: user129:$H$90C7LZqCAYxRKtymr3ziPBnMLAGFzu. My question: how do I recover the hashed passwords (in green), leaving the username/email (in red), still intact, so I can make the output like this: user129:hashcat I hope this is possible! Thanks in advance, ABC RE: Recover passwords in output user:plain - atom - 03-14-2012 hashcat cant do that, oclHashcat-plus can. RE: Recover passwords in output user:plain - ABC - 03-14-2012 And how would I be able to do something like that with oclHashcat-plus, sir? RE: Recover passwords in output user:plain - atom - 03-14-2012 make sure the cracked hashes can be found in hashcat.pot, then use a combination of the --show and --username switches. RE: Recover passwords in output user:plain - Kakoose - 03-18-2012 Hi atom, just a small request from such a proud user, would you please implement this option in hashcat? It would be absolutely wonderful! Unfortunately, I'm not in a position to afford a new computer that is able operate GPU program such as oclHashcat-plus RE: Recover passwords in output user:plain - atom - 03-18-2012 This "feature" should work even without having a GPU. Try it pls and report. RE: Recover passwords in output user:plain - Kakoose - 03-19-2012 Not too sure where you mean, hashcat won't even input (or output), user:hash formats nor is there an option to output user:pass. Maybe I'm not getting what you mean? RE: Recover passwords in output user:plain - atom - 03-19-2012 see here: http://hashcat.net/forum/thread-985-post-5037.html#pid5037 RE: Recover passwords in output user:plain - drfreddy - 04-11-2013 Please, I am very interested in the exact details how to solve this. I have a db with >100k entries (user:hash); roughly half of which have been de-hashed into a separate file (hash:plain). How to best proceed to get a user:plain file? A hashcat.pot file exists, if that's any good. What would an exact oclhashcat-plus command line be? Alternatively, can this be achieved with a cleaver find/replace algo in for example Excel or Notepad++? (And the above posted php solution doesn't work when the lengths of the two input files are mismatched.) RE: Recover passwords in output user:plain - philsmd - 04-11-2013 What you need are following steps (example with mode 0 (md5) of example0.hash): Code: $ cat hashtest.hash # some random *X MASKED* hashes from example0.hash It also seems that the forum search returns *SEVERAL* threads about those --show etc options. For example if you need to reformat it in different ways etc see also: https://hashcat.net/forum/thread-1700.html Furthermore, hashcat.pot is a plain text file, you can sed/grep/awk etc it as you like, even a simple power shell/sh script can loop over input and hashcat.pot file *very* fast! The only thing that is a little bit strange to me is that why --outfile-format will *not* be accepted with --show, e.g Code: $ cudaHashcat-plus64.exe -m 0 hashtest.hash --outfile-format 2 -o output --show --username I am sure @atom will say this is *not* a bug, but we can add it as feature request on TRAC, can we/should we? Best |