06-15-2022, 10:42 PM
(06-15-2022, 10:21 PM)marc1n Wrote: The best way to start is to use your own list of passwords and use the following command on it:
hashcat --force --stdout your_pass_list.txt -r rules/dive.rule > output_pass_list.txt
Then you run the generated list on your hash
Ok, great, thanks - this is more promising
I now get (I''ve just included the relevant parts)
Speed.#1.........: 74114 H/s (5.24ms) @ Accel:4 Loops:256 Thr:512 Vec:1
Recovered........: 1/1 (100.00%) Digests
Progress.........: 258048/16943714 (1.52%)
Rejected.........: 0/258048 (0.00%)
Restore.Point....: 239616/16943714 (1.41%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:9984-9999
Candidate.Engine.: Device Generator
Candidates.#1....: j********159 -> r*****
Hardware.Mon.#1..: Temp: 48c Fan: 0% Util: 79% Core:1888MHz Mem:3802MHz Bus:16
So: what does this all mean
Recovered? 1/1
Candidates? There are two passwors there separated by the ->, but it's neither of those.....
Are we getting closer?
Again, apologies if this is simple stuff I'm asking here...
(There is a chance of a medal if you sort this :-))