02-05-2017, 01:20 PM
Hi all,
I'm very new to Hashcat and password cracking in general, but I'm trying to solve a challenge puzzle and I'm not quite sure how to move forward. Maybe you guys can help.
It goes like this:
1. Having a password's SHA1 hash value of:
6xxe1axxx61ac8b449xxx6f58c4822408ddxxxxx
2. And the possible characters of which the password is made are: (I don't know the password length)
qwinQWIN*+~@580%(=}[
Find the password ...
Having 20 chars to permute in (for ex 8 chars passwords would create a very loooong list, making a dictionary attack hard.
Is there a way to hash this with hashcat that does not require a wordlist ? I'm a noob and not very familiar with how every mode and rules work.
So far I got this:
hashcat64.exe -m 100 -a 3 Hash.txt charsets/Sha1.hcchr
Hash.txt is the location of the hash value and Sha1.hcchr is the location for the string of chars.
I'm very new to Hashcat and password cracking in general, but I'm trying to solve a challenge puzzle and I'm not quite sure how to move forward. Maybe you guys can help.
It goes like this:
1. Having a password's SHA1 hash value of:
6xxe1axxx61ac8b449xxx6f58c4822408ddxxxxx
2. And the possible characters of which the password is made are: (I don't know the password length)
qwinQWIN*+~@580%(=}[
Find the password ...
Having 20 chars to permute in (for ex 8 chars passwords would create a very loooong list, making a dictionary attack hard.
Is there a way to hash this with hashcat that does not require a wordlist ? I'm a noob and not very familiar with how every mode and rules work.
So far I got this:
hashcat64.exe -m 100 -a 3 Hash.txt charsets/Sha1.hcchr
Hash.txt is the location of the hash value and Sha1.hcchr is the location for the string of chars.