[HowTo] Depot oclHashcat-plus's hashcat.pot perfectly
#1
Hi, I figured out this great way to depot passwords from your hashcat.pot file from: Hash[:Salt]Tongueassword to Password only.
This way doesn't mess up with passwords having : in them.

This method depends on only two tools and two steps:
Usage:
Code:
cutb -15 15 < hashcat.pot | cut -d: -f2-
We take the advantage of the fact that oclHashcat-plus doesn't crack < 15 passwords.

In action:
Code:
type 1.txt
202cb962ac59075b964b07152d234b70:123
f3314706ed3f1b46b707eae089059073:vxWwrz@6G|zvq`?tj&&UA43|$9T=BH:123
d350da89ea9826755dc68b42a4c98e67:My:Pass:Word
262d5bcbffd37c91867953a86ca5bd07:ff:My:Pass:Word
7ae40a437c2be08077b28cae34271eeb:goituH0zQUh4RSQyLucRy3hjxPbckz:My:Pass:Word
1f5428ead754c3528e344698fca10bfe:;Qe4#:My:Pass:Word
$H$9XNALAYoBpx7JvT.0qG28I9W68vPyx.:My:Pass:Word
7d763cf6401728f54f2fb8032f8ae86e:::::::wtf
dd2a42f195358b2a8193cb4cb631e7e3:toolongpassword

cutb -15 15 < 1.txt | cut -d: -f2-
123
123
My:Pass:Word
My:Pass:Word
My:Pass:Word
My:Pass:Word
My:Pass:Word
::::::wtf
toolongpassword

However, it's not literally perfect, there are some very rare situations where the password is extracted incorrectly. E.g. It will not work if the password was exactly 15 in length and has : in it.
Reply
#2
(06-21-2012, 08:51 PM)M@LIK Wrote: Hi, I figured out this great way to depot passwords from your hashcat.pot file from: Hash[:Salt]Tongueassword to Password only.
This way doesn't mess up with passwords having : in them.

This method depends on only two tools and two steps:
Usage:
Code:
cutb -15 15 < hashcat.pot | cut -d: -f2-
We take the advantage of the fact that oclHashcat-plus doesn't crack < 15 passwords.

In action:
Code:
type 1.txt
202cb962ac59075b964b07152d234b70:123
f3314706ed3f1b46b707eae089059073:vxWwrz@6G|zvq`?tj&&UA43|$9T=BH:123
d350da89ea9826755dc68b42a4c98e67:My:Pass:Word
262d5bcbffd37c91867953a86ca5bd07:ff:My:Pass:Word
7ae40a437c2be08077b28cae34271eeb:goituH0zQUh4RSQyLucRy3hjxPbckz:My:Pass:Word
1f5428ead754c3528e344698fca10bfe:;Qe4#:My:Pass:Word
$H$9XNALAYoBpx7JvT.0qG28I9W68vPyx.:My:Pass:Word
7d763cf6401728f54f2fb8032f8ae86e:::::::wtf
dd2a42f195358b2a8193cb4cb631e7e3:toolongpassword

cutb -15 15 < 1.txt | cut -d: -f2-
123
123
My:Pass:Word
My:Pass:Word
My:Pass:Word
My:Pass:Word
My:Pass:Word
::::::wtf
toolongpassword

However, it's not literally perfect, there are some very rare situations where the password is extracted incorrectly. E.g. It will not work if the password was exactly 15 in length and has : in it.


why not:
cat file | cut -d: -f2-99
Reply
#3
because the salt might include colons as well.
Reply
#4
If the hash is 40 in length, for example:

cat hashcat.pot | cut -c42-99 > passwords.txt

So it cuts columns 42 - 99.
Reply
#5
hi
how i can use hashcat.pot 15 for onlu number
for craking sl3
Reply
#6
Man, stop please. For SL3 there is NO dictionary, NO pot, oclhashcat-plus is even not intended for SL3 as it have no m1900! For SL3 you can try to use Markov attack which makes statistics file (probability list). Make it yourself from results you have. Seems you don't even understand what is done to crack SL3 and trying to invent something what people last year discussed! Read forums a bit, gsmhosting is good for start.
Reply
#7
This is the perfect way to cut from pot file.

./cutb.bin -15 15 < hashcat.pot | cut -d: -f2- > outfile.txt && sed 's/.*://' outfile.txt > passwords.txt
Reply