02-20-2019, 10:38 PM
Appreciate your reply philsmd,
1. Am I not understanding the process correctly? Don't I have to crack the specific hash that I pulled from the target device to get the password for that device?
I don't understand what you mean by known hash and login? How is it known? Did I miss something?
2. ah, missed the "-r"
but then, I just tried this with the following hybrid dictionary attack using best64 rule with current estimated session time (10 days 13 hrs):
hashcat64 -a 0 -m 7100 -w 3 D:\HashcatCL\hashes\hash1.txt "D:\HashcatCL\wordlists\crackstation human only\realhuman_phill.txt" -r D:\HashcatCL\rules\best64.rule
Session..........: hashcat
Status...........: Running
Hash.Type........: macOS v10.8+ (PBKDF2-SHA512)
Hash.Target......: $ml$32894$f75ad5635a1bad19b0ae22efd80f1765a5d132254...696144
Time.Started.....: Wed Feb 20 12:34:26 2019 (13 secs)
Time.Estimated...: Sun Mar 03 02:29:43 2019 (10 days, 13 hours)
Guess.Base.......: File (D:\HashcatCL\wordlists\crackstation human only\realhuman_phill.txt)
Guess.Mod........: Rules (D:\HashcatCL\rules\best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5386 H/s (52.18ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/4923462313 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/63941069 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:7584-7616
Candidates.#1....: $HEX[042a0337c2a156414d4f532103] -> $HEX[303137313937323037]
Hardware.Mon.#1..: Util:100% Core:1580MHz Mem:2000MHz Bus:16
What am I missing here?
1. Am I not understanding the process correctly? Don't I have to crack the specific hash that I pulled from the target device to get the password for that device?
I don't understand what you mean by known hash and login? How is it known? Did I miss something?
2. ah, missed the "-r"
but then, I just tried this with the following hybrid dictionary attack using best64 rule with current estimated session time (10 days 13 hrs):
hashcat64 -a 0 -m 7100 -w 3 D:\HashcatCL\hashes\hash1.txt "D:\HashcatCL\wordlists\crackstation human only\realhuman_phill.txt" -r D:\HashcatCL\rules\best64.rule
Session..........: hashcat
Status...........: Running
Hash.Type........: macOS v10.8+ (PBKDF2-SHA512)
Hash.Target......: $ml$32894$f75ad5635a1bad19b0ae22efd80f1765a5d132254...696144
Time.Started.....: Wed Feb 20 12:34:26 2019 (13 secs)
Time.Estimated...: Sun Mar 03 02:29:43 2019 (10 days, 13 hours)
Guess.Base.......: File (D:\HashcatCL\wordlists\crackstation human only\realhuman_phill.txt)
Guess.Mod........: Rules (D:\HashcatCL\rules\best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5386 H/s (52.18ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/4923462313 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/63941069 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:7584-7616
Candidates.#1....: $HEX[042a0337c2a156414d4f532103] -> $HEX[303137313937323037]
Hardware.Mon.#1..: Util:100% Core:1580MHz Mem:2000MHz Bus:16
What am I missing here?