06-12-2022, 02:32 PM
(06-12-2022, 09:37 AM)albekkjj Wrote: Thank you Royce. I did a bit more testing, I picked a word from the list (just printed the head to terminal, and picked "00000GIULIA" for testing) and found the following:
- using the "weakpass_3w.7z" wordlist I get a keyspace of 7686592 and hashacat takes 6 second to get exhausted. If I check the candidates than I see them in the form. $HEX[0e21290cb487a80c321aa0b69686c0361f05a44bbc7bcbdee7]
- using the uncompressed "weakpass_3w" I get a keyspace of 1134583776 and the candidates look like plain text and password it gets cracked.
Shall I always extract the files from the archive? I've noticed that hashcat can also be fed with .gz compressed wordlists and works fine.
There's your problem: hashcat only supports .gz and .zip for compressed wordlists. When you give it a .7z file, it's using the compressed binary data as your wordlist (which is suboptimal