Crack help
#1
any one can help to crack this 7-zip hash

when I run 

Code:
./hashcat -m 11600 -a 3 $7z$128$19$0$$16$6c1bf290b87753844a6c3496a083c89f$4126542896$16$4$5fcae88d41b2c81554f70cdb2932a7c6 -O

it out put like below:

Code:
hashcat (v6.2.6) starting

METAL API (Metal 306.2.4)
=========================
* Device #1: Intel(R) HD Graphics 630, skipped
* Device #2: AMD Radeon Pro 560, skipped

OpenCL API (OpenCL 1.2 (Sep 30 2022 01:37:53)) - Platform #1 [Apple]
====================================================================
* Device #3: Intel(R) Core(TM) i7-7820HQ CPU @ 2.90GHz, 8160/16384 MB (2048 MB allocatable), 8MCU
* Device #4: Intel(R) HD Graphics 630, skipped
* Device #5: AMD Radeon Pro 560 Compute Engine, skipped

This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 20

Hash 'z-zsh1533316c1bf290b87753844a6c3496a083c89ffcae88d41b2c81554f70cdb2932a7c6': Separator unmatched
No hashes loaded.

Started: Sun Dec  4 18:02:43 2022
Stopped: Sun Dec  4 18:02:44 2022
Reply
#2
Token length exception: 1/1 hashes
This error happens if the wrong hash type is specified, if the hashes are
malformed, or if input is otherwise not as expected (for example, if the
--username option is used but no username is present)
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.

Use to crack https://www.openwall.com/john/

password is password1
Reply
#3
I use https://www.openwall.com/john/ to get 7-zip hash string [$7z$128$19$0$$16$6c1bf290b87753844a6c3496a083c89f$4126542896$16$4$5fcae88d41b2c81554f70cdb2932a7c6]
Code:
perl ~/Downloads/john-1.9.0-jumbo-1/run/7z2john.pl ~/Downloads/善.7z

善.7z:$7z$128$19$0$$16$6c1bf290b87753844a6c3496a083c89f$4126542896$16$4$5fcae88d41b2c81554f70cdb2932a7c6
but I can not crack the password from this

password is password1 is not correct.

(12-04-2022, 03:11 PM)marc1n Wrote: Token length exception: 1/1 hashes
This error happens if the wrong hash type is specified, if the hashes are
malformed, or if input is otherwise not as expected (for example, if the
--username option is used but no username is present)
This hash-mode is known to emit multiple valid candidates for the same hash.
Use --keep-guessing to continue attack after finding the first crack.

Use to crack https://www.openwall.com/john/

password is password1
Reply