I have a file I encrypted a wile back using ssi AES 256 , I know 90% of the pas maybe 95% lol the password is something like this [5 numbers][word][word] is it possible to use hashcat fill the blanks or would it still take a billion years thanks for any help =)
Brute force AES-256 knowing 90% of pass?
|
04-08-2021, 07:09 AM
Hi,
Did you try to use ?d?d?d?d?dword1word2 If you even know which numbers could be used (if its a date) you want to use custom chars to further limit the candidats. Good luck
04-09-2021, 03:45 AM
I think Centurio has pretty much given you the correct info. If you know something about the 5 digits, you could narrow things down further. For example, 5 digits could be a date. Do you have any idea what format you would have used. It could be
04-15-2021, 11:58 AM
thanks for the replies, I think I might have put an extra character at the end of the password, I am also having issues getting the correct hash from the encrypted file I will be honest I only just started using hashcat what's the best way to extract the hash from an AES 256 encrypted file and then add it to hashcat,
been using the GUI version, but each time I add the hash it fails what hash type should I use etc sorry if I sound like a noob =)
04-15-2021, 11:57 PM
To be sure if you got the hash correct or not, you could use the example hash and see if yours looks like that one. If yes, the problem is somewhere else. If no, then it is your extraction that is the problem.
|
« Next Oldest | Next Newest »
|