Input and Output user/email:pass
#1
Okay so i have 2 issues, first of all i want to crack hashes directly from a
user:hash
or email:hash

Im doing some test and... seems like hashcat detects the user or email also like the hash, and it says 


Code:
C:Wordlist\hashcat-4.2.1>hashcat64 -m 0 hash.txt dictonary.txt
hashcat (v4.2.1) starting...

* Device #1: Intel's OpenCL runtime (GPU only) is currently broken.
            We are waiting for updated OpenCL drivers from Intel.
            You can use --force to override, but do not report related errors.
* Device #3: WARNING! Kernel exec timeout is not disabled.
            This may cause "CL_OUT_OF_RESOURCES" or related errors.
            To disable the timeout, see: https://hashcat.net/q/timeoutpatch
nvmlDeviceGetFanSpeed(): Not Supported

OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 620, skipped.
* Device #2: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz, skipped.

OpenCL Platform #2: NVIDIA Corporation
======================================
* Device #3: GeForce 940MX, 512/2048 MB allocatable, 4MCU

Hashfile 'hash.txt' on line 1 (user1:202cb962ac59075b964b07152d234b70): [b]Token length exception[/b]
Hashfile 'hash.txt' on line 2 (user2:250cf8b51c773f3f8dc8b4be867a9a02): [b]Token length exception[/b]
Hashfile 'hash.txt' on line 3 (user3:68053af2923e00204c3ca7c6a3150cf7): [b]Token length exception[/b]
No hashes loaded.

Started: Fri Sep 07 17:37:32 2018
Stopped: Fri Sep 07 17:37:33 2018

C:Wordlist\hashcat-4.2.1>

The 3 hashes are created by me, obviusly inside wordlist there are the specific passwords, im just testing.

if i just delete te "user1:" " "user2:" "user3:" then hashcat works.

Code:
202cb962ac59075b964b07152d234b70:123
250cf8b51c773f3f8dc8b4be867a9a02:456
68053af2923e00204c3ca7c6a3150cf7:789

Session..........: hashcat
Status...........: Cracked
Hash.Type........: MD5
Hash.Target......: db.txt
Time.Started.....: Fri Sep 07 17:43:02 2018 (0 secs)
Time.Estimated...: Fri Sep 07 17:43:02 2018 (0 secs)
Guess.Base.......: File (dictonary.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#3.....:     5595 H/s (0.03ms) @ Accel:64 Loops:1 Thr:1024 Vec:1
Recovered........: 3/3 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 3/3 (100.00%)
Rejected.........: 0/3 (0.00%)
Restore.Point....: 0/3 (0.00%)
Candidates.#3....: 123 -> 789
HWMon.Dev.#3.....: Temp: 38c Util: 89% Core: 862MHz Mem:2505MHz Bus:4

Started: Fri Sep 07 17:42:58 2018
Stopped: Fri Sep 07 17:43:03 2018


What i need help is to directly crack the hashes from user/email:hash and the output be each user/email with each decrypted pass.


Possible?


Messages In This Thread
Input and Output user/email:pass - by gnubie - 09-07-2018, 05:45 PM
RE: Input and Output user/email:pass - by royce - 09-07-2018, 06:17 PM
RE: Input and Output user/email:pass - by gnubie - 09-07-2018, 10:56 PM
RE: Input and Output user/email:pass - by gnubie - 09-08-2018, 01:14 PM
RE: Input and Output user/email:pass - by undeath - 09-08-2018, 03:43 PM
RE: Input and Output user/email:pass - by royce - 09-08-2018, 04:15 PM
RE: Input and Output user/email:pass - by gnubie - 09-08-2018, 05:46 PM
RE: Input and Output user/email:pass - by gnubie - 09-08-2018, 11:13 PM
RE: Input and Output user/email:pass - by gnubie - 09-08-2018, 11:58 PM