Hi guys,
Just to let you know that JTR loads these hashes perfectly, and got em cracked in a few seconds (the pw's are simple 6-char all-digits ones).
Not pretty sure of why HashCat is having issues with such an oldie as PKZIP.
--------------
root@hashVM:/JohnTheRipperJumbo/run# ./john list25-03.hash
Using default input encoding: UTF-8
Loaded 12 password hashes with 12 different salts (PKZIP [32/64])
Will run 12 OpenMP threads
Note: Passwords longer than 21 [worst case UTF-8] to 63 [ASCII] rejected
Proceeding with single, rules:Single
Press 'q' or Ctrl-C to abort, 'h' for help, almost any other key for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:./password.lst
Enabling duplicate candidate password suppressor
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
12g 0:00:00:01 DONE 2/3 (2025-03-12 16:30) 6.704g/s 453077p/s 3761Kc/s 3761KC/s vianet..ewan90
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
root@hashVM:/JohnTheRipperJumbo/run#
--------------
Anyone willing to discuss this, pls feel free to post.
Just to let you know that JTR loads these hashes perfectly, and got em cracked in a few seconds (the pw's are simple 6-char all-digits ones).
Not pretty sure of why HashCat is having issues with such an oldie as PKZIP.
--------------
root@hashVM:/JohnTheRipperJumbo/run# ./john list25-03.hash
Using default input encoding: UTF-8
Loaded 12 password hashes with 12 different salts (PKZIP [32/64])
Will run 12 OpenMP threads
Note: Passwords longer than 21 [worst case UTF-8] to 63 [ASCII] rejected
Proceeding with single, rules:Single
Press 'q' or Ctrl-C to abort, 'h' for help, almost any other key for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:./password.lst
Enabling duplicate candidate password suppressor
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
<redacted> (?)
12g 0:00:00:01 DONE 2/3 (2025-03-12 16:30) 6.704g/s 453077p/s 3761Kc/s 3761KC/s vianet..ewan90
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
root@hashVM:/JohnTheRipperJumbo/run#
--------------
Anyone willing to discuss this, pls feel free to post.
