01-12-2017, 05:56 PM
(This post was last modified: 01-12-2017, 06:32 PM by robbierayrob.)
(01-12-2017, 04:05 PM)Jiminy Wrote: For one, from what I see, you are using -a3, which is for brute forcing and didn't supply a mask. Whatever is in the passwords.txt and hash.txt files, I assume they are the actual file hashes? If not, they should be. And, they have to be of the same kind, i.e. md5, sha1, bcrypt, or whatever. All you experts out there, feel free to correct me if I'm in error.
(01-12-2017, 10:20 AM)robbierayrob Wrote: Well ive typed in this code in my windwos 10 cmd, because i kinda want this process to be abit quick, as i am in a rush, but heres what came up.
im also trying to crack a bcrypt that is 60 characters and it says line-length exception error
Code used: hashcat.64.exe -m3200 -a3 -o cracked.txt passwords.txt hash.txt
would be great if i knew what was wrong so i can learn and fix on my mistakes!
I filled the password.txt with the passwords i thought would be used to crack the hashes (bruteforce), im most likely wrong, but if there are others ways of executing this 60 character long bcrypt hash, i would love to know! i filled the hashes txt with hashes, and im a complete idiot to these types of things, and would really appreciate your guys help!
this also my first time doing this btw
<3