Help about office documents
#1
Hello everyone i need your help
I want to attack a office 2007 document with oclhashcat
But i don't know how can i do
Is there anyone help about that ?
Best Regards
#2
The general procedure is to use something like: office2hashcat.py (e.g. office2hashcat ) to extract the information needed from the office document
and
after that you run it with the correct hash type (-m 9400 = Office 2007 according to --help and https://hashcat.net/wiki/doku.php?id=example_hashes ).

If this (first step) was not the problem in your case, you need to give us more details what the problem (or maybe error message) is.
#3
Hi thanks for your reply
I used office2hashcat.py and created hash information about office document and also used flag which belongs to office documents -m 9400=2007 9500=2010 9600=2013.
My commands are below :
cudaHashcat64.exe -a 0 -m 9400 -o cracked.txt hash.txt wordlist.txt when i used these command there is an error which is " No hash loaded "
where is my fault ?
Kind Regards
#4
Please have a look at this wiki page: https://hashcat.net/wiki/doku.php?id=example_hashes

Inside the file hash.txt (for hash type -m 9400) the hash lines must be exactly like this:
$office$*2007*20*128*16*.....

Please try to make a test with the example hash (see wiki link above, search for "Office 2007").
Are you able to load/crack this specific test hash ?

Also note that there should be no extra white spaces (for instance " ") after the actual hash etc

Reminder: do not post hashes here as a response to this post (it is against the forum rules ... instead try to understand what exactly is different with your hashes and if the examples work).

Furthermore, if the hash.txt files was not empty, normally you would get a warning before you see the "No hash loaded" messages... if this is the case, read it carefully and try to react according to the warning(s)
#5
Thank you very much
Now İt worked. Smile
Could you explain me how to attack with brute force to office documents ?
Best Regards
#6
Please read this thread: https://hashcat.net/forum/thread-3665.html