Hi guys, newbie here
I need to recover the password of an old tc hidden volume I created a long time ago.
The password is very long but I think I remember the first 34 characters
I created a wordlist with maskprocessor with almost a billion passwords inside and I extracted the hash with dd (first 512 Bytes, right?).
Now I just need to launch something like this
That's it.
Is there a way to do that or the limit ( I think for the -a attack) is insuperable?
Thanks in advance
p.s. I'm on a Mac and I installed hashcat with brew because the other way caused problems :\
p.p.s. the password shouldn't be longer than 40-42 characters... now I'm testing the range 36-40
edit:
I've tried with an alternative dict file that contains only short words (6 letters) and it doesn't work either :\ What am I doing wrong?
The message says:
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 64
No hashes loaded.
No hashes loaded.
I need to recover the password of an old tc hidden volume I created a long time ago.
The password is very long but I think I remember the first 34 characters
I created a wordlist with maskprocessor with almost a billion passwords inside and I extracted the hash with dd (first 512 Bytes, right?).
Now I just need to launch something like this
Code:
hashcat -a 0 -m 62xx file.hash file.dict
Is there a way to do that or the limit ( I think for the -a attack) is insuperable?
Thanks in advance
p.s. I'm on a Mac and I installed hashcat with brew because the other way caused problems :\
p.p.s. the password shouldn't be longer than 40-42 characters... now I'm testing the range 36-40
edit:
I've tried with an alternative dict file that contains only short words (6 letters) and it doesn't work either :\ What am I doing wrong?
The message says:
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 64
No hashes loaded.
No hashes loaded.