Posts: 1
Threads: 1
Joined: Aug 2016
Hello Community!
I'm trying to crack a hash from a Fortigate OS user account, but noticed the -m 7000 is no longer valid within hashcat's latest build. I'm unsure when this was dropped off, but curious if there's a known alternative.
Thanks!
-Kasha
Posts: 2,267
Threads: 16
Joined: Feb 2013
08-19-2016, 06:56 PM
(This post was last modified: 08-19-2016, 06:58 PM by philsmd.)
-m 7000 = Fortigate (FortiOS) was never implemented in oclHashcat/cudaHashcat and therefore is currently also not available in hashcat 3.10 (since hashcat 3.00 basically improved oclHashcat to support OpenCL-compatible CPUs too and is therefore not a direct successor of hashcat-legacy).
You can download hashcat-legacy and use your CPU to crack those hashes:
https://github.com/hashcat/hashcat-legacy/releases (or you could compile hashcat-legacy from git if you want).
If you really insist that this should be implemented into hashcat 3+, you should open a github issue (but not sure how many requests for this algorithm we get.... therefore it might at least take some time until somebody implements it into hashcat 3+, if at all).