Bruteforce not finding simple 4 letter hash?
#4
Sure!  The hash is NTLM unsalted.  it is:

Code:
cindybear:1001:aad3b435b51404eeaad3b435b51404ee:B2898109643D7086DF2D0D780CD78865:::

The password now is the four letter word "what".

Here is the full output:

Code:
$ hashcat -m 1000 -a 3 -i --increment-min=4  easyntlm.txt ?l?l?l?l -O
hashcat (v6.0.0-4-g5628317d) starting...

OpenCL API (OpenCL 1.2 (Jun 15 2018 20:52:09)) - Platform #1 [Apple]
====================================================================
* Device #1: Intel(R) Core(TM) i7-4980HQ CPU @ 2.80GHz, skipped
* Device #2: Iris Pro, 1472/1536 MB (384 MB allocatable), 40MCU
* Device #3: AMD Radeon R9 M370X Compute Engine, skipped

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 27

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force
* Raw-Hash

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Host memory required for this attack: 409 MB

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted. 

Session..........: hashcat                     
Status...........: Exhausted
Hash.Name........: NTLM
Hash.Target......: b2898109643d7086df2d0d780cd78865
Time.Started.....: Wed Jun 24 11:59:14 2020 (0 secs)
Time.Estimated...: Wed Jun 24 11:59:14 2020 (0 secs)
Guess.Mask.......: ?l?l?l?l [4]
Guess.Queue......: 1/1 (100.00%)
Speed.#2.........:  140.4 MH/s (0.87ms) @ Accel:8 Loops:26 Thr:512 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 456976/456976 (100.00%)
Rejected.........: 0/456976 (0.00%)
Restore.Point....: 17576/17576 (100.00%)
Restore.Sub.#2...: Salt:0 Amplifier:0-26 Iteration:0-26
Candidates.#2....: snaa -> xqzz

Started: Wed Jun 24 11:59:12 2020
Stopped: Wed Jun 24 11:59:15 2020
Reply


Messages In This Thread
RE: Bruteforce not finding simple 4 letter hash? - by led5150 - 06-24-2020, 06:00 PM