Recover passwords in output user:plain
#10
What you need are following steps (example with mode 0 (md5) of example0.hash):

Code:
$ cat hashtest.hash # some random *X MASKED* hashes from example0.hash
philsmd:42cceb8a0dXXX82b8fb6831f3XXXXXX
drfreddy:27b797965aXXX466041487f2a4XXXXXX
$ cudaHashcat-plus64.exe -t 32 -a 7 hashtest.hash ?a?a?a?a example.dict --username
$ grep 42cceb8a0d hashcat.pot  # to make sure they are in hashcat.pot
$ cudaHashcat-plus64.exe -m 0 hashtest.hash --show --username


It also seems that the forum search returns *SEVERAL* threads about those --show etc options.
For example if you need to reformat it in different ways etc see also: https://hashcat.net/forum/thread-1700.html
Furthermore, hashcat.pot is a plain text file, you can sed/grep/awk etc it as you like, even a simple power shell/sh script can loop over input and hashcat.pot file *very* fast!


The only thing that is a little bit strange to me is that why --outfile-format will *not* be accepted with --show, e.g

Code:
$ cudaHashcat-plus64.exe -m 0 hashtest.hash --outfile-format 2 -o output --show --username
... returns the same output as without --outfile-format

I am sure @atom will say this is *not* a bug, but we can add it as feature request on TRAC, can we/should we?

Best


Messages In This Thread
Recover passwords in output user:plain - by ABC - 03-14-2012, 03:29 AM
RE: Recover passwords in output user:plain - by philsmd - 04-11-2013, 04:17 PM