Posts: 17
Threads: 5
Joined: May 2023
hi everyone
how do i use these unicode characters in my password
unicode.PNG (Size: 14.03 KB / Downloads: 5)
I would appreciate it if you could give a clear answer please.
for example password :
Byt6op125¶¥Æ¾¼§º©154 how can i break the unicode. that i wrote in red.
no matter what i did i couldn't
thanks in advance for your answer
Posts: 17
Threads: 5
Joined: May 2023
05-25-2023, 11:19 AM
(This post was last modified: 05-25-2023, 11:23 AM by amrgdnn.)
(05-25-2023, 10:15 AM)amrgdnn Wrote: hi everyone
how do i use these unicode characters in my password
I would appreciate it if you could give a clear answer please.
for example password : Byt6op125¶¥Æ¾¼§º©154 how can i break the unicode. that i wrote in red.
no matter what i did i couldn't
thanks in advance for your answer
I have 28 btc from mining in 2009. I used these characters in my wallet password. I will share with someone who teaches me how to use these characters in hashcat. I only use mask attack but
?s does not contain these characters
I use this characters but whic one ı dont know :
颡£¤¥¦§¨©ª«¬®¯°±²³´µ¶¹¸º»¼½¾¿ÀÁÂÃÄ×£
Posts: 889
Threads: 15
Joined: Sep 2017
the easiest way is to use hexcharset but for this you will need to convert these chars first
see
https://www.utf8-zeichentabelle.de/unico...e.pl?names=-
for example the following singns and its hex expression
¶ is c2 b6
§ is c2 a7
© is c2 a9
Æ ic c3 86
be aware, as hashcat works on bytesize, to crack a single © you have to use a mask of length 2 like this:
to crack Byt6op125© (for humans 10 chars, but for hashcat its 11 bytes as © is bytesize 2)
--hex-charset -1 c2c3 -2 86a7a9b6 Byt6op125?1?2
Posts: 17
Threads: 1
Joined: Jun 2020
Posts: 1
Threads: 0
Joined: Jun 2023
06-08-2023, 11:04 AM
(This post was last modified: 06-08-2023, 11:05 AM by BTC-Cracka.
Edit Reason: spelling mistake
)
Hi amrgdnn
If you still have issue working it out I can help you out, PM me
Posts: 10
Threads: 5
Joined: Nov 2022
Hi. Have you solved your problem?
I have made a lot of changes in my passwords generator, so it can make a passwords lists as you need. I made additional config for you "ConfigForum.txt" if you repleace original Config.txt with it, you can generate wordlists and put them directly to Hashcat with my program, if I fully uderstood mask rules you want to use ;-), if not, change it as you wish.
On my laptop, i7-9750H CPU @ 2.60GHz, password generation speed with mask I made in ConfigForum.txt is about 850k/s. Pretty good, I think.
I must to write documentation, maybe next time. I will be grateful for comments, tests and help. Sorry for the programming style, I'm not a professional programmer.
https://github.com/Arduan77/MikiDecoder
Happy cracking.
Posts: 6
Threads: 1
Joined: Sep 2023
09-25-2023, 05:23 AM
(This post was last modified: 09-25-2023, 05:35 AM by MrRaja.)
It sort of work for me but i made a pyscript (with gpt) to turn unicode into hexstrings and the remove duplicates to then represent each byte as itself. So whatever unicode you got that is 2 bytes long you can plop in the python script below and it will give you Unique Byte1 and Byte2:
Byt6op125¶¥Æ¾¼§º©154
Code:
def unicode_to_hexstring(input_string):
byte1_string = [] # Initialize a list to store byte1 values
byte2_string = [] # Initialize a list to store byte2 values
# Iterate through each character in the input string
for char in input_string:
# Encode the character to bytes using UTF-8 encoding
char_bytes = char.encode('utf-8')
# Split the bytes into two parts (byte1 and byte2)
byte1 = char_bytes[0]
byte2 = char_bytes[1] if len(char_bytes) > 1 else b'\x00'
# Convert each byte to a hexadecimal string and append to the respective list
byte1_string.append(f'{byte1:02X}')
byte2_string.append(f'{byte2:02X}')
# Join the hexadecimal strings of byte1 and byte2 and return as a tuple
return ''.join(byte1_string), ''.join(byte2_string)
def remove_duplicates(hex_string):
# Convert the hexadecimal string to a list of bytes
bytes_list = [hex_string[i:i+2] for i in range(0, len(hex_string), 2)]
# Remove duplicate bytes while preserving the order
unique_bytes = []
for byte in bytes_list:
if byte not in unique_bytes:
unique_bytes.append(byte)
# Join the unique bytes into a single hexadecimal string
return ''.join(unique_bytes)
# Input Unicode string
unicode_string = "颡£¤¥¦§¨©ª«¬®¯°±²³´µ¶¹¸º»¼½¾¿ÀÁÂÃÄ×£"
# Get hexadecimal representations of byte1 and byte2
byte1_hex, byte2_hex = unicode_to_hexstring(unicode_string)
# Remove duplicates from both byte1 and byte2 hexadecimal strings
unique_byte1 = remove_duplicates(byte1_hex)
unique_byte2 = remove_duplicates(byte2_hex)
# Print the unique byte1 and byte2 values
print("Unique-Byte1:", unique_byte1)
print("Unique-Byte2:", unique_byte2)
You use the Unique-Byte1 by adding 'hashcat.exe -m 0 md5.hash -a 3 -1 "byte1" -2 "byte2" -3 ?1?2 (using your example PW in post) --hex-charset Byt6op125?3?3?3?3?3?3?3?3154 ' That way you replace every Unicode with ?3 and use ?a for non-unicode i suppose. note why --hex-charset is important: it turns all the bytes from byte1&byte2 into 'unicode' when hashcracking.