I ran into a couple of tricky issues
#3
26+10 = 36, lenght of 10 36^10 should be attackable as this is lower than 2^64 (the maximum candidates hashcat can store before running into overflow)

i dont get why the hsh.txt is given by full path if its already inside your hahscat folder you can simply use hsh.txt

BUT a 15mb hash is quite huge, i think the mainproblem will be, that there are some lenght restrictions apply here, how do you obtain the hash0? there is a python script from john the ripper, all you need to do is redirect the output directly t a text file like

zip2john.py zipfile > hash.txt
Reply


Messages In This Thread
I ran into a couple of tricky issues - by Silent_ - 08-14-2022, 05:00 AM
RE: I ran into a couple of tricky issues - by Snoopy - 08-17-2022, 11:02 AM