Posts: 37
Threads: 11
Joined: Mar 2022
помогите с нестандартными символами .
есть такая проблема, как включить символ "€" в атаку по маске?
hashcat.exe -m 13000 -A 3 -1 abcdefghijklmnopqrstuvwxyz € $ 0123456789 HASH ? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1
на этом входе ничего не происходит. Hashcat не видит €
Posts: 37
Threads: 11
Joined: Mar 2022
[quote="Duckworth" pid='54931' dateline='1647955420']
помогите с нестандартными символами .
есть такая проблема, как включить символ "€" в атаку по маске?
hashcat.exe -m 13000 -A 3 -1 abcdefghijklmnopqrstuvwxyz € $ 0123456789 ХЭШ ? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1? 1
на этом входе ничего не происходит. Hashcat не видит €
[/Цитировать]
Перерыл весь форум, но так и не понял. и мне также не нужна целая библиотека нестандартных символов. единственный.
Posts: 868
Threads: 15
Joined: Sep 2017
i hope deepl dont get me wrong (the forum language is english)
to include € you have to do some work around
problem with none ascii chars is the following hashcat works with bytes and bytesized objects
the € sign is utf-8 and its byte/hex expression ist the following
€:e282ac
so the € sign is 3 bytes in length total
following simple test setup
md5(€1) - > 2677f97bb01d31b7fba26af994e087cf
maskfile (charset taken from your example)
?l == lower chars (built in)
?d == digits (built in)
Code: ?l?d€$,?1
?l?d€$,?1?1
?l?d€$,?1?1?1
?l?d€$,?1?1?1?1
hashcat -a3 -m0 -O hash maskfile
this will crack the pass €1 on the fourth line, because for hashcat the pass €1 is E282AC31, 4 bytes in total so the mask has to be at least of length 4
there are some possibilitys to tune this a little bit further (--hex-charset and using all of the 4 custom charset), but i hope you get the point, to crack a "human readable" pass like -> mypassword1€ ( 12 chars for humans, your mask has to be 14 in length) or maybe a better, to crack the single sign € your mask needs to be of length 3 with the given charset, not 1
Posts: 37
Threads: 11
Joined: Mar 2022
(03-22-2022, 04:38 PM)Snoopy Wrote: i hope deepl dont get me wrong (the forum language is english)
to include € you have to do some work around
problem with none ascii chars is the following hashcat works with bytes and bytesized objects
the € sign is utf-8 and its byte/hex expression ist the following
€:e282ac
so the € sign is 3 bytes in length total
following simple test setup
md5(€1) - > 2677f97bb01d31b7fba26af994e087cf
maskfile (charset taken from your example)
?l == lower chars (built in)
?d == digits (built in)
Code: ?l?d€$,?1
?l?d€$,?1?1
?l?d€$,?1?1?1
?l?d€$,?1?1?1?1
hashcat -a3 -m0 -O hash maskfile
this will crack the pass €1 on the fourth line, because for hashcat the pass €1 is E282AC31, 4 bytes in total so the mask has to be at least of length 4
there are some possibilitys to tune this a little bit further (--hex-charset and using all of the 4 custom charset), but i hope you get the point, to crack a "human readable" pass like -> mypassword1€ ( 12 chars for humans, your mask has to be 14 in length) or maybe a better, to crack the single sign € your mask needs to be of length 3 with the given charset, not 1 thank you very much
Posts: 37
Threads: 11
Joined: Mar 2022
03-23-2022, 02:15 AM
(This post was last modified: 03-23-2022, 02:32 AM by Duckworth.)
(03-22-2022, 04:38 PM)Snoopy Wrote: i hope deepl dont get me wrong (the forum language is english)
to include € you have to do some work around
problem with none ascii chars is the following hashcat works with bytes and bytesized objects
the € sign is utf-8 and its byte/hex expression ist the following
€:e282ac
so the € sign is 3 bytes in length total
following simple test setup
md5(€1) - > 2677f97bb01d31b7fba26af994e087cf
maskfile (charset taken from your example)
?l == lower chars (built in)
?d == digits (built in)
Code: ?l?d€$,?1
?l?d€$,?1?1
?l?d€$,?1?1?1
?l?d€$,?1?1?1?1
hashcat -a3 -m0 -O hash maskfile
this will crack the pass €1 on the fourth line, because for hashcat the pass €1 is E282AC31, 4 bytes in total so the mask has to be at least of length 4
there are some possibilitys to tune this a little bit further (--hex-charset and using all of the 4 custom charset), but i hope you get the point, to crack a "human readable" pass like -> mypassword1€ ( 12 chars for humans, your mask has to be 14 in length) or maybe a better, to crack the single sign € your mask needs to be of length 3 with the given charset, not 1
I understood correctly that I have to convert the entire set of characters, including €, into a hash file. and then write it when attacking, given this number of bytes
how in that case the request should look?
hashcat -m 13000 -a3 hash -1 maskfile ?1?1?1?1?1?1?1? but i'm probably dumb
Posts: 868
Threads: 15
Joined: Sep 2017
just a fast answer, the mask can be tuned a little bit, but this asnwer would be more complicated
copy this
Code: ?l?d€$,?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
into a file called maskfile
then use the following commandline
Code: hashcat -m 13000 -a3 -O --increment hash maskfile
--increment will tell hahscat to take this mask from above, starting on postiion 1 and then position 1-2 and so on till it reaches 1-20
this mask will test all passes with combinations lower chars, digits, $ and € (i took your example from above)
Posts: 37
Threads: 11
Joined: Mar 2022
(03-23-2022, 12:29 PM)Snoopy Wrote: just a fast answer, the mask can be tuned a little bit, but this asnwer would be more complicated
copy this
Code: ?l?d€$,?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
into a file called maskfile
then use the following commandline
Code: hashcat -m 13000 -a3 -O --increment hash maskfile
--increment will tell hahscat to take this mask from above, starting on postiion 1 and then position 1-2 and so on till it reaches 1-20
this mask will test all passes with combinations lower chars, digits, $ and € (i took your example from above) now everything is clear to me. Thank you very much friend
Posts: 37
Threads: 11
Joined: Mar 2022
(03-23-2022, 12:29 PM)Snoopy Wrote: just a fast answer, the mask can be tuned a little bit, but this asnwer would be more complicated
copy this
Code: ?l?d€$,?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
into a file called maskfile
then use the following commandline
Code: hashcat -m 13000 -a3 -O --increment hash maskfile
--increment will tell hahscat to take this mask from above, starting on postiion 1 and then position 1-2 and so on till it reaches 1-20
this mask will test all passes with combinations lower chars, digits, $ and € (i took your example from above)
C:\Users\Username\Desktop\hashcat-6.2.5\hashcat-6.2.5>hashcat.exe -m 13000 -a -O --increment $rar5$16$e2bc2ff1c32c75ae8b7dc13315030f9a$15$0f65ddda418e54d85a6306ed21f235ca$8$1ee1ed4bfb0ad7ff maskfile.txt
The specified parameter cannot use '-O' as a value - must be a number. error
Posts: 37
Threads: 11
Joined: Mar 2022
Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
Posts: 868
Threads: 15
Joined: Sep 2017
your -a is missing the 3
so -a3
if integer overflow is showing up, the mask is too long, mostly this starts with bruteforce and mask of length >=12, so sry for that
|