How to crack md5 hash where long cleartext is *almost* known?
#2
Yes this is possible, using rules.

See this link to learn about rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack

keep in mind though that;
1. Rules are applied to a wordlist. So your cleartexts will all go in a wordlist where hashcat will read them and apply rules.
2. Your plain text is long, hence this can become a slow process depending on how many rules you apply, and how big your wordlist is as well as how big the plain text candidates are in length.



(02-23-2014, 08:01 PM)questme Wrote: Hi,

I have unsalted md5 hashes of longer-than-usual-passwords strings -- think of SMS or Twitter messages -- where I know more or less the cleartext, but not exactly.

For example I have the md5 hash ******************* and know that the cleartext string is similar to "this is a example String?". How can I get hashcat to find the true cleartext, which is "this is an Example string!"? In this example one char changed from lower case to upper case, one char was added and one special char changed.

I'd like to have a way to automatically modify the string in 1, 2 or even 3 positions with changing upper/lower cases and adding/deleting a character. Is that possible with hashcat?


Messages In This Thread
RE: How to crack md5 hash where long cleartext is *almost* known? - by rurapenthe - 02-23-2014, 08:08 PM