05-31-2016, 11:22 AM
I'm trying to get oclHashCat/cudaHashCat to find some known passwords, but it's not working. Here's an example:
Password: «T€$t»
$ echo -n «T€\$t» | sha1sum
db0822a82e3598764a2836008736987d8555f494
$ echo -n «T€\$t» | hexdump -C
00000000 c2 ab 54 e2 82 ac 24 74 c2 bb |..T...$t..|
So this is UTF8-encoded, and as you can see, some chars have 1-byte encodings, some have 2-byte encodings, and some have 3-byte encodings. The € symbol is encoded with 3 bytes, like this:
$ echo -n € | hexdump -C
00000000 e2 82 ac |...|
00000003
How can I specify the character set necessary to find this with hashcat? Shouldn't take too long, it's only 6 characters long.
The following does not work:
$ cudaHashcat64.bin -m 100 -a 3 --custom-charset1=«»Tt€\$ test.txt ?1?1?1?1?1?1
The following actually works, but if I have to specify all 2 and 3 byte characters as potential hex combinations, I'll be wasting a _lot_ of time trying invalid combinations:
$ cudaHashcat64.bin -m 100 -a 3 --custom-charset1=«»Tt€\$ test.txt ?1?1?1?1?1?1?1?1?1?1
To crack an 8-character long password with this method, I have to tell hashcat to try all combinations of up to 24 bytes long, which is unlikely to ever finish?
Password: «T€$t»
$ echo -n «T€\$t» | sha1sum
db0822a82e3598764a2836008736987d8555f494
$ echo -n «T€\$t» | hexdump -C
00000000 c2 ab 54 e2 82 ac 24 74 c2 bb |..T...$t..|
So this is UTF8-encoded, and as you can see, some chars have 1-byte encodings, some have 2-byte encodings, and some have 3-byte encodings. The € symbol is encoded with 3 bytes, like this:
$ echo -n € | hexdump -C
00000000 e2 82 ac |...|
00000003
How can I specify the character set necessary to find this with hashcat? Shouldn't take too long, it's only 6 characters long.
The following does not work:
$ cudaHashcat64.bin -m 100 -a 3 --custom-charset1=«»Tt€\$ test.txt ?1?1?1?1?1?1
The following actually works, but if I have to specify all 2 and 3 byte characters as potential hex combinations, I'll be wasting a _lot_ of time trying invalid combinations:
$ cudaHashcat64.bin -m 100 -a 3 --custom-charset1=«»Tt€\$ test.txt ?1?1?1?1?1?1?1?1?1?1
To crack an 8-character long password with this method, I have to tell hashcat to try all combinations of up to 24 bytes long, which is unlikely to ever finish?