Cracking Android Pattern Hash
#5
That was easy Smile

Hashcat already supports this, check out this example:

Quote:
root@ht:~/hashcat-0.45# cat hash
ae93f0d3b77f4ab42a4c90de5291a8a19bb6540f

root@ht:~/hashcat-0.45# ./hashcat-cliXOP.bin -m 100 -a 3 -o key hash --hex-charset -1 000102030405060708 ?1?1?1?1?1
Initializing hashcat v0.45 by atom with 8 threads and 32mb segment-size...

Added hashes from file hash: 1 (1 salts)
Activating quick-digest mode for single-hash

...

All hashes have been recovered

root@ht:~/hashcat-0.45# xxd key
0000000: 6165 3933 6630 6433 6237 3766 3461 6234 ae93f0d3b77f4ab4
0000010: 3261 3463 3930 6465 3532 3931 6138 6131 2a4c90de5291a8a1
0000020: 3962 6236 3534 3066 3a00 0104 0508 0a 9bb6540f:......


Take a close look at the last line:

0000020: 3962 6236 3534 3066 3a00 0104 0508 0a 9bb6540f:......


Messages In This Thread
Cracking Android Pattern Hash - by budabob07 - 03-24-2013, 03:02 AM
RE: Cracking Android Pattern Hash - by atom - 03-24-2013, 08:09 AM
RE: Cracking Android Pattern Hash - by atom - 03-24-2013, 08:10 AM
RE: Cracking Android Pattern Hash - by philsmd - 03-24-2013, 01:31 PM
RE: Cracking Android Pattern Hash - by atom - 03-24-2013, 04:10 PM
RE: Cracking Android Pattern Hash - by budabob07 - 03-25-2013, 02:15 AM