Using newline character as part of mask attack
#2
if you use --hex-charset every character you specify must be specified in hexadecimal.
Therefore you must use:

Code:
hashcat64 -a 3 -m 0 -O --hex-charset -1 0a hash.txt 757365726e616d65?1?a?a?a

or (a little shorter):

Code:
hashcat64 -a 3 -m 0 -O --hex-charset hash.txt 757365726e616d650a?a?a?a


i.e. also the chars "u", "s", "e", "r", "n", "a", "m", "e", must be converted to 0x75, 0x73, 0x65, 0x72, 0x6e, 0x61, 0x6d and 0x65 respectively.

Furthermore, you also need to consider that for some operating system a new line is \r\n instead of just \n.

BTW: you are probably using the wrong hash mode altogether: if you want to attack a salted hash, you should use the corresponding hash mode, see: https://hashcat.net/wiki/example_hashes.

For instance for md5 ($salt . $pass) where the salt is your "username\n" substring, you should use -m 20 = md5($salt.$pass)

also note: that there is also a --hex-salt option, therefore you can also add the \n within the hash file very easily.


Messages In This Thread
RE: Using newline character as part of mask attack - by philsmd - 04-22-2018, 07:11 AM