Hitting my wits end.
#1
hello,

Ive been trying to fix my problem for around a week and a half now, looking on the wiki and scouring various threads do not seem to help, so my only other option is to see if any of you more experienced users with this utility, could hopefully assist me with my problem so that I can be better in the future.


I have a .rar file that i would like to crack  but it seems that several things tend to go wrong and I am at a loss on how to remedy these issues

C:\Users\Operator\Desktop\hashcat-6.0.0>C:\Users\Operator\Desktop\hashcat-6.0.0\hashcat.exe -m 12500 -a 3 "InputHashHere"  ?l?l?l?l?l?l?l?l

so when I input this , I get this ,



""ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.""




and then it seems like its trying to Initialize
but after it says

"Initializing backend runtime for device #1..."


then it does nothing at all

so I keep trying

but it constantly does nothing at all afterwards, even if I give it time,
it just prompts me to input more commands

""Initializing backend runtime for device #1...""
""C:\Users\Operator\Desktop\hashcat-6.0.0>""




so I then decide to append the command with - O

C:\Users\Operator\Desktop\hashcat-6.0.0>C:\Users\Operator\Desktop\hashcat-6.0.0\hashcat.exe -m 12500 - O "InputHashHere"


and then I get,


"""ATTENTION! Read timeout in stdin mode. The password candidates input is too slow:
* Are you sure that you are using the correct attack mode (--attack-mode or -a)?
* Are you sure that you want to use input from standard input (stdin)?
* If so, are you sure that the input from stdin (the pipe) is working correctly and is fast enough?"""


and after a little while , like 2 min I receive this ,

""No password candidates received in stdin mode, aborting...""

every time , without fail.



I have even attempted to update my gpu drivers , but to no avail.

does anyone have any suggestions ?

any and all help would be much appreciated.
Reply
#2
what hardware/GPU do you have ? This is important information. (from your cmd output, I assume you are using windows operating system... but it's also always good to mention this info)

Try following this guide: https://hashcat.net/faq/wrongdriver


Furthermore, your command is incorrect, I've fixed it for you:

Code:
hashcat.exe -m 12500 -a 0 -w 3 -O "InputHashHere" word_list.txt

or for mask attack ("brute-force", see https://hashcat.net/wiki/doku.php?id=maskprocessor) of 4 characters (symbols, letters, numbers), only password length 4:
Code:
hashcat.exe -m 12500 -a 3 -w 3 -O "InputHashHere" ?a?a?a?a
Reply
#3
(06-24-2020, 08:09 AM)philsmd Wrote: what hardware/GPU do you have ? This is important information. (from your cmd output, I assume you are using windows operating system... but it's also always good to mention this info)

Try following this guide: https://hashcat.net/faq/wrongdriver


Furthermore, your command is incorrect, I've fixed it for you:

Code:
hashcat.exe -m 12500 -a 0 -w 3 -O "InputHashHere" word_list.txt

or for mask attack ("brute-force", see https://hashcat.net/wiki/doku.php?id=maskprocessor) of 4 characters (symbols, letters, numbers), only password length 4:
Code:
hashcat.exe -m 12500 -a 3 -w 3 -O "InputHashHere" ?a?a?a?a


Thank you very much!

finally some progress.

so I have a dumb question , is there anyway for me to make a brute force mask attack that uses specific  letters (upper and lowercase) , numbers and symbols ? because I know some of them but I do not know the positioning and or capitalization of some of the letters.

so basically I want to use only "x,x,x,x,x,x,x,x" letters "y.y.y.y" numbers and "z,z,z" symbols , starting from a min of 4 combinations to 20 .   is that possible?
Reply
#4
Code:
hashcat.exe -m 12500 -a 3 -w 3 -O --increment --increment-min 4 --increment-max 20 --custom-charset2 abcKLM13579,-: "InputHashHere" ?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2

for all the details about masks and custom charsets (like --custom-charset2), see https://hashcat.net/wiki/doku.php?id=mask_attack

you won't be mathematically/practical and theoretical be able to just "brute-force" a 20 character password with a lot of unknown characters. If you really think that the password is that long and you have no further information about a fixed substring or part of the password, I would recommend using rule based attacks instead:
https://hashcat.net/wiki/doku.php?id=rule_based_attack
i.e. create a dictionary file with a lot of possible/candidate password and mangle them (apply rules to the password and "hope" for a hit). Just brute-forcing a "random" 20 byte password won't be feasible
Reply