problems with basic bruteforcing
#1
Hello,

i tried the popular thing and did some tests running rockyou against linkedin hashes and that stuff works fine.

I can also hash stuff with md5sum for example and cerate wordlists that match or will match when combined by rules. This is also working fine.

However when i try to to some really basic bruteforcing i cant get the hashes cracked.

For example:

:~# echo 1234 | md5sum
e7df7cd2ca07f4f1ab415d457a6e1c13

:~# echo test | md5sum
d8e8fca2dc0f896fd7cb4cb0031ba249

when i put this hashes into a txt file and run it against:

hashcat-cli32.exe -a 3 --pw-min=4 --pw-max=4 -m 0 -n 2 -c 64 testmd5.txt -1 ?l?u?d?s ?1?1?1?1

i dont get any results:

Input.Mode: Mask (?1?1?1?1)
Index.....: 0/1 (segment), 81450625 (words), 0 (bytes)
Recovered.: 0/2 hashes, 0/1 salts
Speed/sec.: 12.72M plains, 12.72M words
Progress..: 81450625/81450625 (100.00%)
Running...: 00:00:00:06
Estimated.: --:--:--:--

Started: Wed Apr 03 14:38:16 2013
Stopped: Wed Apr 03 14:38:23 2013


From what (little) I understand so far this should work quite fast and well but I dont get any result at all.

Is there an obvious mistage in what i am doing?

Thanks for the help!
Regards
Sebastian
#2
typical user error.

do not use echo, use echo -n, otherwise the newline is part of the hash
#3
working... Wink

i figured i was being stupid.

Thank you!
#4
A few other ways to generate hashes, for any users wanting to make sure their technique is giving the same results as other techniques:
Windows:
Code:
copy con password.txt
1234^z
md5sum password.txt >passwordA.md5
jacksum -a md5 password.txt >passwordB.md5
notepad passwordA.txt
<remove everything after the hash ends, i.e. the filename>
notepad passwordB.txt
<remove everything after the hash ends, i.e. the filename>
Where ^z means Ctrl-Z.

Jacksum supports a very wide variety of single hash outputs.