01-30-2013, 04:19 PM
This is a follow up on the following thread which was closed:
http://hashcat.net/forum/thread-1204.html
So here's the hash:pass in question (from the mentioned post, not real user data):
507620db658a3d55c367cc8273e2ee24:ьфдщн
I was able to crack the hash using the password in a dictionary (UTF8 format) but when I try to crack it via bruteforce, it does not work. Here's the command line I use
Hashcat-cli64 -a 3 -m 0 hash.txt ?R?R?R?R?R
Is it me or it's not working for other people as well. Waiting for this to create a trac.
http://hashcat.net/forum/thread-1204.html
So here's the hash:pass in question (from the mentioned post, not real user data):
507620db658a3d55c367cc8273e2ee24:ьфдщн
I was able to crack the hash using the password in a dictionary (UTF8 format) but when I try to crack it via bruteforce, it does not work. Here's the command line I use
Hashcat-cli64 -a 3 -m 0 hash.txt ?R?R?R?R?R
Is it me or it's not working for other people as well. Waiting for this to create a trac.