Hello community,
I try to create a SIP Digest Authenticaiton MD5 hash to crack it with hashcat, but there seems to be a problem.
Below is an attachment of register packet from wireshark.
So the hash i created with these details is :
$sip$*sip:192.168.0.38**Renia*asterisk*REGISTER*sip*sip:192.168.0.38**61b3081d****MD5*e50978c1b8c8cc4d0c78988690ed461e
The nonce and response values are different. I was making some other tries.
The command i am running in hashcat is : hashcat64.exe -a 0 - m 11400 hash.txt dictionary.txt
where dictionary is the file which contains the cracked password.
The hashcat's output is : "Approaching final keyspace - workload adjusted."
My question is if iam doing something wrong or what do i have to add to the hash?
Note: some white gaps in the pictures are because it is my public ip.
Thanks in advance.
I try to create a SIP Digest Authenticaiton MD5 hash to crack it with hashcat, but there seems to be a problem.
Below is an attachment of register packet from wireshark.
So the hash i created with these details is :
$sip$*sip:192.168.0.38**Renia*asterisk*REGISTER*sip*sip:192.168.0.38**61b3081d****MD5*e50978c1b8c8cc4d0c78988690ed461e
The nonce and response values are different. I was making some other tries.
The command i am running in hashcat is : hashcat64.exe -a 0 - m 11400 hash.txt dictionary.txt
where dictionary is the file which contains the cracked password.
The hashcat's output is : "Approaching final keyspace - workload adjusted."
My question is if iam doing something wrong or what do i have to add to the hash?
Note: some white gaps in the pictures are because it is my public ip.
Thanks in advance.