07-31-2015, 06:55 PM
I was able to extract the hashes in the correct format by using office2hashcat.py script. I was also able to run a dictionary attack of 5 random charecter strings on the hashes but it seems the that dictionary file which i generated using PWGen 2.54 did not create all permutation of the passwords, ofcourse the password need not be 5 charecters long, however i know for these specific hashes they are. I reached an average of 16xxx H/s with dictionary and 17xxx with bruteforce ( without wordlist ). Right now i am trying to figure out a proper wordlist creator which will help me generate all possibilities dictionary file based on the charecter set i provide. Suggestions ?