No password candidates received in stdin mode, aborting...
#1
Hi! i need help.

I am trying to crack password windows server 2016 standard. I extract the hash by pwdump7. And using HashcatGUI_1.1beta0 to crack, but i got this message " No password candidates received in stdin mode, aborting..."

I google and  add more option "--stdin-timeout-abort" i put it in with 300 sec. But it still show same result. If any one know the problem.

Here is the command: 

hashcat64.exe -a 0 --session=2019-02-13 -m 1000 -w 3 -D 1 --status --status-timer=20 --potfile-disable -p : -O --hwmon-disable -o "C:\tmp\123.txt" --outfile-format=1 -g 10000 "C:\tmp\2016S.txt" --stdin-timeout-abort 300

And the result :

No password candidates received in stdin mode, aborting...

Session..........: 2019-02-13
Status...........: Aborted
Hash.Type........: NTLM
Hash.Target......: C:\tmp\\2016S.txt
Time.Started.....: Wed Feb 13 15:53:58 2019 (5 mins, 6 secs)
Time.Estimated...: Wed Feb 13 15:59:04 2019 (0 secs)
Guess.Base.......: Pipe
Guess.Mod........: Rules (Generated)
Speed.#2.........:        0 H/s (0.00ms) @ Accel:1024 Loops:256 Thr:1 Vec:4
Recovered........: 0/4 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0
Rejected.........: 0
Restore.Point....: 0
Restore.Sub.#2...: Salt:0 Amplifier:0-0 Iteration:0-256
Candidates.#2....: [Copying]
Started: Wed Feb 13 15:53:54 2019
Stopped: Wed Feb 13 15:59:04 2019
Reply
#2
There are lots of options but none of those is a wordlist.
Reply
#3
(02-13-2019, 12:02 PM)undeath Wrote: There are lots of options but none of those is a wordlist.

i did not use wordlist
Reply
#4
well, that much is clear. But you're running a wordlist attack.
Reply
#5
alexb, to clarify: you've told hashcat that you want to use your own wordlist (-a 0), but you haven't supplied one.
~
Reply
#6
(02-13-2019, 12:47 PM)undeath Wrote: well, that much is clear. But you're running a wordlist attack.

hi! i did not use wordlist, since it only contain some pass that maybe match with the password. The password i crack is combine of alphabet, number, special key, Uper case , lower case.

So, could you give me the full command that is right to run without wordlist.

Thanks
Reply
#7
(02-13-2019, 04:03 PM)royce Wrote: alexb, to clarify: you've told hashcat that you want to use your own wordlist (-a 0), but you haven't supplied one.

thanks Royce, i see that
Reply
#8
Please read https://hashcat.net/wiki/doku.php?id=mask_attack it will help you now and in the future
Reply
#9
Do you know that the password contains all those types of characters? If not, a wordlist attack with one of the larger rules files included in hashcat may do the job.
Reply
#10
(02-13-2019, 05:20 PM)atom Wrote: Please read https://hashcat.net/wiki/doku.php?id=mask_attack it will help you now and in the future

Thanks Atom
Reply