09-02-2018, 01:05 AM
(This post was last modified: 09-02-2018, 01:39 AM by greaseMonkey.
Edit Reason: Grammer
)
Attached is a file for a radio update that keeps failing to install for me and i would like to look at the source code. From skimming the file it appears that the passwords are are stored in the file as SHA256 hashes but I am still in part of the learning curve involved in all of this. Could someone verify my understanding of what I have in that file and how I would go about cracking those hashes. I would assume being a software company the passwords aren't going to be simple to crack but I could be wrong with this assumption. I have the newest version of Hashcat installed along with the utilities package. So far I have played around with simple hashes with dictionary attacks and rules such as best64 and rockyou-30000.
NOTE***FILES ARE XML extension changes to txt for upload. Should still open correctly for the purpose to examinint the data
Any help would be greatly appreciated,
greaseMonkey
NOTE***FILES ARE XML extension changes to txt for upload. Should still open correctly for the purpose to examinint the data
Any help would be greatly appreciated,
greaseMonkey