10-18-2020, 08:03 AM
(This post was last modified: 10-18-2020, 09:04 AM by LackuJacku.)
When I'm trying to launch a hashcat command i get
'(hashes).txt: Byte Order Mark (BOM) was detected'
please help...
I'm using a command like this
where
-w3 - work factor
-O optimised kernel
32hex.txt - target hashes
Top32Million .. wordlist
-r <rules>
--loopback - feed cracks into another round.
using the "nsa" rules from here: https://github.com/NSAKEY/nsa-rules/blob....dive.rule .
hashes look like this:
b42ed4587effab65bde6eb981b6c392
652f7bb717d4fa77259fab7911b6d09
b8178ad47ee4d5e7309050499be8e7c
c7db751abb1a860e4ce1c8de5bcbb95
49ad0b2b48dcbc9df343ce96d3aa22c
7c651fdc7d7f60359cdc13a22ad50a8
198UJUxiF7rsAteoQoSegvyubSUXE1Umhz
idk what type they are and if you could find what they are could you tell me a good website where i can identify them?
I found the fix by changing the file type, but you cant hash cisco 7 with hashcat so :/
'(hashes).txt: Byte Order Mark (BOM) was detected'
please help...
I'm using a command like this
Code:
hashcat64.exe -a0 -m 0 32hex.txt Top32Million-probable.txt -r rules/InsidePro-PasswordsPro.rule --loopback -O -w3
where
-w3 - work factor
-O optimised kernel
32hex.txt - target hashes
Top32Million .. wordlist
-r <rules>
--loopback - feed cracks into another round.
using the "nsa" rules from here: https://github.com/NSAKEY/nsa-rules/blob....dive.rule .
hashes look like this:
b42ed4587effab65bde6eb981b6c392
652f7bb717d4fa77259fab7911b6d09
b8178ad47ee4d5e7309050499be8e7c
c7db751abb1a860e4ce1c8de5bcbb95
49ad0b2b48dcbc9df343ce96d3aa22c
7c651fdc7d7f60359cdc13a22ad50a8
198UJUxiF7rsAteoQoSegvyubSUXE1Umhz
idk what type they are and if you could find what they are could you tell me a good website where i can identify them?
I found the fix by changing the file type, but you cant hash cisco 7 with hashcat so :/