Posts: 65
Threads: 18
Joined: Jun 2013
05-16-2014, 10:52 PM
(This post was last modified: 05-16-2014, 11:00 PM by crackall.)
May be to make that LM dump perceived from pwdump as a one passwd(as on L0phtCrack)
no deal split on two parts
not to do it:
---
cut -d : -f 3 dump > 1
cut -c 1-16 1 > 2
cut -c 17-32 1 >> 2
---
hc -m 3000 2 dic.txt
just do it:
hc -m 3001 1 dic.txt
leave -m 3000 - for LM one hash
add -m 3001 - read and crack LM as double hash
Posts: 2,936
Threads: 12
Joined: May 2012
feature requests go on trac, not the forums
Posts: 130
Threads: 1
Joined: Jan 2014
Man, I have no idea what you are saying...
Posts: 55
Threads: 8
Joined: Apr 2013
I have a couple of scripts I run, which splits the hash into a first and second. Then I crack though all of them and compile in one file. Once I am done I run another script that reassembles them. Seems to work pretty good.
Posts: 55
Threads: 8
Joined: Apr 2013
Oh and if you look at the top there is a link called trac, you can go there and register an account. Once you have an account you can put in feature requests such as the one you just proposed and the developers will consider adding it to hashcat.
Posts: 803
Threads: 135
Joined: Feb 2011
On linux you can use
Code:
fold -w 16 hashes32.txt > hashes16.txt
On windows, download GNU utils :
http://gnuwin32.sourceforge.net/packages...ls-bin.htm
Posts: 65
Threads: 18
Joined: Jun 2013
Why bother with this excess broken hash and then collect the pieces in the whole passwords. LM weak hash does not need to break in two part, it is better to brute the whole piece at once.
Posts: 65
Threads: 18
Joined: Jun 2013
05-21-2014, 06:16 AM
(This post was last modified: 05-22-2014, 03:39 PM by crackall.)
I would like to clarify
double hash are reading by HC as 2 hash separately and bruteforce in prior algoritm.
and shows a whole password only when the two pieces are broken.
both sides will be found in any case in a very short time