04-14-2026, 11:15 PM
first of all.....this is learning project for me
situation is next:
- i have multivolume RAR-files (part01, part02.....part11)
- it has hash format 12500 rar3-hp
- i know the password (lower alpha and numeric). i can unrar the archive. so i am not after the password, but trying to learn the use of hashcat.
- i made wordlist of 430 different entries with lower-alpha and numbers.
hashcat can't recover my password.
command is
and this the result of the running session
WinRAR info says "RAR 4.x Volume, data and names encrypted".
what am i doing wrong?
why can't hashcat find the password which is in the wordlist?
situation is next:
- i have multivolume RAR-files (part01, part02.....part11)
- it has hash format 12500 rar3-hp
- i know the password (lower alpha and numeric). i can unrar the archive. so i am not after the password, but trying to learn the use of hashcat.
- i made wordlist of 430 different entries with lower-alpha and numbers.
hashcat can't recover my password.
command is
Code:
>hashcat.exe -a 0 -m 12500 -w 3 -S --session=tmp62B7 --potfile-disable -p : --hwmon-temp-abort=75 -o "C:\Users\xxxx\Downloads\hashcat-7.1.2\output.txt" --outfile-format=1,2 "C:\Users\xxxx\AppData\Local\Temp\tmp62B7.tmp" "C:\Users\xxxx\Downloads\random-wordlist-generator-portable\nieuw.2.txt"
hashcat (v7.1.2) starting - session [tmp62B7]and this the result of the running session
Code:
OpenCL API (OpenCL 3.0 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #01: Intel(R) UHD Graphics 730, 15122/30244 MB (2047 MB allocatable), 8MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 128
Minimum salt length supported by kernel: 0
Maximum salt length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Host memory allocated for this attack: 2775 MB (53141 MB free)
Dictionary cache built:
* Filename..: C:\Users\xxxx\Downloads\random-wordlist-generator-portable\nieuw.2.txt
* Passwords.: 430
* Bytes.....: 5986
* Keyspace..: 430
* Runtime...: 0 secs
Approaching final keyspace - workload adjusted.
Session..........: tmp62B7
Status...........: Exhausted
Hash.Mode........: 12500 (RAR3-hp)
Hash.Target......: $RAR3$*0*9f54??????*4ba4e??????????
Time.Started.....: Tue Apr 14 22:49:43 2026 (5 secs)
Time.Estimated...: Tue Apr 14 22:49:48 2026 (0 secs)
Kernel.Feature...: Pure Kernel (password length 0-128 bytes)
Guess.Base.......: File (C:\Users\xxxx\Downloads\random-wordlist-generator-portable\nieuw.2.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#01........: 110 H/s (116.88ms) @ Accel:1 Loops:16384 Thr:36 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 430/430 (100.00%)
Rejected.........: 0/430 (0.00%)
Restore.Point....: 430/430 (100.00%)
Restore.Sub.#01..: Salt:0 Amplifier:0-1 Iteration:245760-262144
Candidate.Engine.: Host Generator + PCIe
Candidates.#01...: test8227768 -> test9993139
Started: Tue Apr 14 22:49:37 2026
Stopped: Tue Apr 14 22:49:49 2026WinRAR info says "RAR 4.x Volume, data and names encrypted".
what am i doing wrong?
why can't hashcat find the password which is in the wordlist?
