06-05-2017, 07:25 AM
(This post was last modified: 06-05-2017, 07:27 AM by frameshift6283.)
I'm a very new user of Hashcat and I'm trying to use it for hash type 7100 (PBKDF2-SHA512) in order to recover an administrator password on my Mac running OSX El Capitan.
I followed the instructions of the top post here, and I have a hash.txt file of this format: $ml$<iterations(integer)>$<salt(hex)>$<entropy(hex)>. I have placed this file in the hashcat folder on my PC.
Sorry if this is a very basic question, but how would you format the command in command prompt to perform a dictionary attack based on the information in the hash file? (Assuming I have a wordlist.) The answer on the StackExchange forum only had a brute force attack shown as an example, and even that didn't work when I tried to run it ( hashcat64.exe -m 7100 hash.txt -a 3 ?d?d?d?d ) .
The reason I'm trying to do a dictionary attack is because the password is up to 12 characters long.
Thanks for any help!
I followed the instructions of the top post here, and I have a hash.txt file of this format: $ml$<iterations(integer)>$<salt(hex)>$<entropy(hex)>. I have placed this file in the hashcat folder on my PC.
Sorry if this is a very basic question, but how would you format the command in command prompt to perform a dictionary attack based on the information in the hash file? (Assuming I have a wordlist.) The answer on the StackExchange forum only had a brute force attack shown as an example, and even that didn't work when I tried to run it ( hashcat64.exe -m 7100 hash.txt -a 3 ?d?d?d?d ) .
The reason I'm trying to do a dictionary attack is because the password is up to 12 characters long.
Thanks for any help!