09-27-2017, 02:34 PM
(This post was last modified: 09-27-2017, 02:36 PM by rsberzerker.
Edit Reason: Fixed typo
)
2) Depends on the hashtype.
3) You are using the parameter --outfile-format 2
From the wiki:
You may want 3, not 2. Or just leave that parameter out and you should get 3.
5) A good wordlist is a very subjective thing. There is no one magical place to get them. The rockyou list is a good starting point, unabridged dictionaries are also good. I found some census data and used that for a name dictionary. There's dictionaries based on the bible, and even ones based on wikipedia. You can even use previously cracked passwords as a wordlist. There is also a program out there (I forget it's name) that will make a wordlist from scraping a website. If the hashes came from a specialized website, this can be quite effective.
But wordlists alone won't get you very far. I noticed your command lacks rules. Use them. Hashcat comes with lots good sets. Best64 is called best for a reason. It may not crack the most passwords of the included rulesets, but for the time spent, it gives the best hashes cracked/minute of all the ones I've tested so far. You can also try multiple rule sets. The rate of cracking will go down, but you will [likely] crack more.
3) You are using the parameter --outfile-format 2
From the wiki:
Code:
- [ Outfile Formats ] -
# | Format
===+========
1 | hash[:salt]
2 | plain
3 | hash[:salt]:plain
4 | hex_plain
5 | hash[:salt]:hex_plain
6 | plain:hex_plain
7 | hash[:salt]:plain:hex_plain
8 | crackpos
9 | hash[:salt]:crack_pos
10 | plain:crack_pos
11 | hash[:salt]:plain:crack_pos
12 | hex_plain:crack_pos
13 | hash[:salt]:hex_plain:crack_pos
14 | plain:hex_plain:crack_pos
15 | hash[:salt]:plain:hex_plain:crack_pos
You may want 3, not 2. Or just leave that parameter out and you should get 3.
5) A good wordlist is a very subjective thing. There is no one magical place to get them. The rockyou list is a good starting point, unabridged dictionaries are also good. I found some census data and used that for a name dictionary. There's dictionaries based on the bible, and even ones based on wikipedia. You can even use previously cracked passwords as a wordlist. There is also a program out there (I forget it's name) that will make a wordlist from scraping a website. If the hashes came from a specialized website, this can be quite effective.
But wordlists alone won't get you very far. I noticed your command lacks rules. Use them. Hashcat comes with lots good sets. Best64 is called best for a reason. It may not crack the most passwords of the included rulesets, but for the time spent, it gives the best hashes cracked/minute of all the ones I've tested so far. You can also try multiple rule sets. The rate of cracking will go down, but you will [likely] crack more.