01-04-2023, 06:19 PM
(01-04-2023, 05:50 PM)cola Wrote: Here is the result of the cracking attempt with a random mask:
Code:hashcat -a 3 -m 11600 321.hash ?l?l?l?l?l?l?l?l?l
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 3.0+debian Linux, None+Asserts, RELOC, LLVM 13.0.1, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
============================================================================================================================================
* Device #1: pthread-AMD Ryzen 9 3900X 12-Core Processor, 31062/62188 MB (8192 MB allocatable), 24MCU
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashfile '321.hash' on line 1 ($7$1$1...416231c8d30778412$100$5d00004000): Signature unmatched
No hashes loaded.
Started: Wed Jan 4 17:28:08 2023
Stopped: Wed Jan 4 17:28:08 2023
The 7z archive/files are not encrypted in any way, just password protected. I can also try running hashcat on my Dell R420 - ubuntu 20.4 - ,but it will take some time setting up the machine and I doubt this will solve the issue
I could post the hash, but from what I know, posting complete hashes is not allowed.
You can see by the header that your 7z version is different and probably not supported by hashcat