10-26-2018, 03:47 PM
(10-26-2018, 03:35 PM)undeath Wrote: your are doing something weird. Why are you using -a6 with a 7 char mask when you're trying to crack a LM hash? The plaintext cannot be longer than 7 chars.
(10-26-2018, 03:30 PM)Marsupilami Wrote: but then the estimated time is always 0 sec.
When piping candidates hashcat cannot calculate the estimated time.
ah ok thats confusing yes i see..
what i want to to
The plaintext password(of course I know it) is M%rFofT!:W$u.M
The first part M%RFoFT i got with rainbowtables. Because of the design of LM Algorithm its all Uppercase
M%RFOFT
Unfortunately hashcat don't support the old NetLM- Algorithm so i have to crack the NetNTLM-Part of it which is case sensitive
So i created a textfile with all possibilities as described above and want to Brute force the remaining 7 chars a?a?a?a?a?a?a? that i get the 14 chars NTLMv1 password
hashcat -a 6(hybrid attack dict+mask) possibilities.txt ?a?a?a?a?a?a?a -m 5500 (NetNTLMv1)
I expect something like this:
M%RFoFTsH!:KI%