help cracking PBKDF2-SHA512
#3
Appreciate your reply philsmd,

1. Am I not understanding the process correctly? Don't I have to crack the specific hash that I pulled from the target device to get the password for that device?
I don't understand what you mean by known hash and login? How is it known? Did I miss something?

2. ah, missed the "-r"
but then, I just tried this with the following hybrid dictionary attack using best64 rule with current estimated session time (10 days 13 hrs):

hashcat64 -a 0 -m 7100 -w 3 D:\HashcatCL\hashes\hash1.txt "D:\HashcatCL\wordlists\crackstation human only\realhuman_phill.txt" -r D:\HashcatCL\rules\best64.rule

Session..........: hashcat
Status...........: Running
Hash.Type........: macOS v10.8+ (PBKDF2-SHA512)
Hash.Target......: $ml$32894$f75ad5635a1bad19b0ae22efd80f1765a5d132254...696144
Time.Started.....: Wed Feb 20 12:34:26 2019 (13 secs)
Time.Estimated...: Sun Mar 03 02:29:43 2019 (10 days, 13 hours)
Guess.Base.......: File (D:\HashcatCL\wordlists\crackstation human only\realhuman_phill.txt)
Guess.Mod........: Rules (D:\HashcatCL\rules\best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5386 H/s (52.18ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/4923462313 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/63941069 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:7584-7616
Candidates.#1....: $HEX[042a0337c2a156414d4f532103] -> $HEX[303137313937323037]
Hardware.Mon.#1..: Util:100% Core:1580MHz Mem:2000MHz Bus:16

What am I missing here?
Reply


Messages In This Thread
help cracking PBKDF2-SHA512 - by mh1 - 02-20-2019, 09:44 AM
RE: help cracking PBKDF2-SHA512 - by philsmd - 02-20-2019, 10:07 AM
RE: help cracking PBKDF2-SHA512 - by mh1 - 02-20-2019, 10:38 PM
RE: help cracking PBKDF2-SHA512 - by philsmd - 02-20-2019, 10:52 PM
RE: help cracking PBKDF2-SHA512 - by mh1 - 02-26-2019, 01:18 AM