Bcrypt Blowfish Unix Hash
#3
Thanks royce, I think everything working good but wondering why its impossible to crack a 6-digit numerical code? Here what I get:
I used this command:
./hashcat -m 3200 -a 3 -1 ?d /Users/gumshoe/Documents/Hash.lst ?1?1?1?1?1?1

I got this:

hashcat (v4.1.0) starting...

OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i5-5350U CPU @ 1.80GHz, skipped.
* Device #2: Intel(R) Iris(TM) Graphics 6100, 384/1536 MB allocatable, 48MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 72

Watchdog: Temperature abort trigger disabled.

* Device #2: Skipping unstable hash-mode 3200 for this device.
You can use --force to override, but do not report related errors.
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: bcrypt $2*$, Blowfish (Unix)
Hash.Target......: $2a$04$37xD.RGtAtsQBEuvE.8gv.XQwqH4Of1gNkNg/BWuoysn...oLpu6C
Time.Started.....: Tue Feb 27 10:53:05 2018 (0 secs)
Time.Estimated...: Tue Feb 27 10:53:05 2018 (0 secs)
Guess.Mask.......: ?1?1?1?1?1?1 [6]
Guess.Charset....: -1 ?d, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/1000000 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/100000 (0.00%)

Started: Tue Feb 27 10:53:04 2018
Stopped: Tue Feb 27 10:53:06 2018


Then I used --force command for device 2

./hashcat -m 3200 --force -a 3 -1 ?d /Users/gumshoe/Documents/Hash.lst ?1?1?1?1?1?1

It worked and got this:

hashcat (v4.1.0) starting...

OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i5-5350U CPU @ 1.80GHz, skipped.
* Device #2: Intel(R) Iris(TM) Graphics 6100, 384/1536 MB allocatable, 48MCU

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 72

Watchdog: Temperature abort trigger disabled.

[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => s

Session..........: hashcat
Status...........: Running
Hash.Type........: bcrypt $2*$, Blowfish (Unix)
Hash.Target......: $2a$04$37xD.RGtAtsQBEuvE.8gv.XQwqH4Of1gNkNg/BWuoysn...oLpu6C
Time.Started.....: Tue Feb 27 10:55:20 2018 (23 secs)
Time.Estimated...: Tue Feb 27 11:04:43 2018 (9 mins, 0 secs)
Guess.Mask.......: ?1?1?1?1?1?1 [6]
Guess.Charset....: -1 ?d, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#2.....: 1772 H/s (12.39ms) @ Accel:1 Loops:1 Thr:8 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 42240/1000000 (4.22%)
Rejected.........: 0/42240 (0.00%)
Restore.Point....: 4224/100000 (4.22%)
Candidates.#2....: 102090 -> 130488


Finally it completed the attack in 10 minutes but nothing recovered. How strange?


Messages In This Thread
Bcrypt Blowfish Unix Hash - by Gumshoe - 02-27-2018, 05:33 PM
RE: Bcrypt Blowfish Unix Hash - by royce - 02-27-2018, 05:36 PM
RE: Bcrypt Blowfish Unix Hash - by Gumshoe - 02-27-2018, 06:02 PM
RE: Bcrypt Blowfish Unix Hash - by undeath - 02-27-2018, 06:36 PM
RE: Bcrypt Blowfish Unix Hash - by Gumshoe - 02-27-2018, 06:45 PM
RE: Bcrypt Blowfish Unix Hash - by undeath - 02-27-2018, 06:53 PM