Correct cmd for 7z file using brute force
#1
Howdy
I am trying to recover the password for a 7z file that I lost the pwd for.

I am not using a wordlist. 

I have to specify upper case, lower case numbers and several symbols such as ! or @, etc. 

I've tried running this cmd and I know it's wrong. can anyone help me? I've read several threads, examples, and I'm not sure how to specify the right charset. The password might be 9 characters long and I can't remember any parts of it. 

/hashcat -a 3 -m 11600 mfilehash.txt 

To get the hash for the file I used 7z2hashcat

Is that the best option? The file is large and I really need to recover it. 

Thx to everyone in advance!


Messages In This Thread
Correct cmd for 7z file using brute force - by jillbrooke - 11-22-2017, 06:19 AM