sha512 find password with known pass and salt
#2
Progress, someone replied to my post but the reply was deleted after a few seconds/minutes, thanks anyway!

I've put the pass (?hash?) and the salt in one txt file like this pass:salt and run the command again, hashcat tried to recover the password but failed. 2 ATTENTIN messages where displayed during the process
ATTENTION! Pure (unoptimized) backend kernels selected.

Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.

and this
ATTENTION! Read timeout in stdin mode. Password candidates input is too slow:

* Are you sure you are using the correct attack mode (--attack-mode or -a)?
* Are you sure you want to use input from standard input (stdin)?
* If using stdin, are you sure it is working correctly, and is fast enough?

along with one abort message
No password candidates received in stdin mode, aborting

Did i do something else wrong?
The pass consists of 128 characters all of which are upper case letters and numbers
The salt consists of 64 characters containing lower and upper case letters, numbers and special characters including colon

The passwords i need to recover are from a filezilla server, the previously responsible technician failed to document the passwords.
Reply


Messages In This Thread
RE: sha512 find password with known pass and salt - by Tiralo33 - 02-07-2023, 06:17 PM