hascat plaintext mode (99999) with weakpass_3w list
#4
(06-12-2022, 09:37 AM)albekkjj Wrote: Thank you Royce. I did a bit more testing, I picked a word from the list (just printed the head to terminal, and picked "00000GIULIA" for testing) and found the following:
  • using the "weakpass_3w.7z" wordlist I get a keyspace of  7686592 and hashacat takes 6 second to get exhausted. If I check the candidates than I see them in the form. $HEX[0e21290cb487a80c321aa0b69686c0361f05a44bbc7bcbdee7]
  • using the uncompressed "weakpass_3w" I get a keyspace of 1134583776 and the candidates look like plain text and password it gets cracked.

Shall I always extract the files from the archive? I've noticed that hashcat can also be fed with .gz compressed wordlists and works fine.

There's your problem: hashcat only supports .gz and .zip for compressed wordlists. When you give it a .7z file, it's using the compressed binary data as your wordlist (which is suboptimal Wink
Reply


Messages In This Thread
RE: hascat plaintext mode (99999) with weakpass_3w list - by pdo - 06-12-2022, 02:32 PM