Hashcat
Attachment | Size |
---|---|
IT3700 Inclass Hashcat.docx | 2.38 MB |
Some examples for cracking passwords
Check rockyou.txt for lm passwords
Jean_Grey:1022:D9CD13973A50CFAAF72C44FED3C74F89:B5EA9EB916B31037AAB55CA8396CC1F6:::
Samwise_Gamgee:1005:34F6AD9BFFE478E8A97823AFE131E903:8A00DBEC40EFDA86EABB5C61F19B4CC0:::
C:\Users\jeffsly\Desktop\3700Inffo\hash>more ..\hashlm.txt
D9CD13973A50CFAAF72C44FED3C74F89
34F6AD9BFFE478E8A97823AFE131E903
hashcat64 -m 3000 --force ..\hashlm.txt ..\rockyou.txt
Dictionary cache built:
* Filename..: ..\rockyou.txt
* Passwords.: 27181941
* Bytes.....: 139921497
* Keyspace..: 27181941
* Runtime...: 2 secs
d9cd13973a50cfaa:PHOENIX
f72c44fed3c74f89:WE
34f6ad9bffe478e8:53ALOOG
a97823afe131e903:HOBEE53
Session..........: hashcat
Status...........: Cracked
Hash.Type........: LM
Hash.Target......: 34f6ad9bffe478e8, f72c44fed3c74f89
Time.Started.....: Tue Feb 26 19:49:07 2019 (9 secs)
Time.Estimated...: Tue Feb 26 19:49:16 2019 (0 secs)
Guess.Base.......: File (..\rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 2533.1 kH/s (12.02ms) @ Accel:128 Loops:1 Thr:64 Vec:1
Recovered........: 4/4 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 23199744/27181941 (85.35%)
Rejected.........: 0/23199744 (0.00%)
Restore.Point....: 23003136/27181941 (84.63%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: 5520726 -> E
Started: Tue Feb 26 19:49:02 2019
Stopped: Tue Feb 26 19:49:18 2019
Check rockyou.txt for ntlm passwords
More hashntlm.txt
FC432E8FD52C2520767330050BBF3310
7A3E84E084F68388A317E164A20DAF90
CA1FA260D6480893545F85166C2B7542
DE171F3B01381E57058F50D94C8C552E
2FC3D44C77F0E3613C5AF33FB5593E46
C82CE6C6321F9CCFDDF6F61AE9990211
CBFE76262F459D9E6DFE604928F25BFE
925E1C10A82159EB937406B88B947B66
A2CB5F2F11E87449FAA2DC6423CBFFA7
3FF9C37F92823F957E634C506E17E05E
9DB6A3632C2212FC56A3B99AC26CB6AE
C16AC9708F204F2998F62167719FB561
85D7434D9D4878A54A770E53AD99A233
244E4BC51A0EBA847AF61BA88F8F14CC
40611F15A0EB72968A373231C6B28B0D
1E028DBA574EEB6C4AF2957108B6DB02
hashcat64 -m 1000 --force ..\hashntlm.txt ..\rockyou.txt
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Dictionary cache hit:
* Filename..: ..\rockyou.txt
* Passwords.: 14344384
* Bytes.....: 139921497
* Keyspace..: 14344384
244e4bc51a0eba847af61ba88f8f14cc:Ironman
ca1fa260d6480893545f85166c2b7542:adamantium
925e1c10a82159eb937406b88b947b66:Sp1derman
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: NTLM
Hash.Target......: ..\hashntlm.txt
Time.Started.....: Tue Feb 26 19:58:12 2019 (6 secs)
Time.Estimated...: Tue Feb 26 19:58:18 2019 (0 secs)
Guess.Base.......: File (..\rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 2473.6 kH/s (9.27ms) @ Accel:128 Loops:1 Thr:64 Vec:1
Recovered........: 3/16 (18.75%) Digests, 0/1 (0.00%) Salts
Progress.........: 14344384/14344384 (100.00%)
Rejected.........: 0/14344384 (0.00%)
Restore.Point....: 14344384/14344384 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: $HEX[30323133446f6d] -> $HEX[042a0337c2a156616d6f732103]
Started: Tue Feb 26 19:58:06 2019
Stopped: Tue Feb 26 19:58:20 2019
Check rockyou.txt for MD5 passwords
Luke_Skywalker:$1$n47Nd/ii$S7XBCr1R8KQrIMpOyG0dv.:17951:0:99999:7:::
Chewbacca:$1$8V/HyGb/$dSz6YsIcTTpUp8v2dnt.H1:17951:0:99999:7:::
Han_Solo:$1$WSDE1Ayz$WIlGcyU8Zk7FOofF1kpQI1:17951:0:99999:7:::
Obi-Wan_Kenobi:$1$ggabl/dR$4Rc2BsLw155NxVsN6EQXB0:17951:0:99999:7:::
Darth_Vadar:$1$QbTSwshI$GloevRhTxpg8.9ooAC9Fq/:17951:0:99999:7:::
Yoda:$1$aQEun5dN$k8EQB1WIOYIHb3shSGvHa.:17951:0:99999:7:::
Darth_Maul:$1$zU5PI/JH$okokGFEs8DNIn7eyS2eR7.:17951:0:99999:7:::
Palpatine:$1$PnaOGMpm$FP/vnPcWsU9F3WatMSl2k.:17951:0:99999:7:::
Lando_Calrissian:$1$xVQVGWIL$1XQs4hLblOiaIboyC80XV/:17951:0:99999:7:::
General_Grievous:$1$I5IIxfua$krXOBvpB4ugYmYdvsIlai0:17951:0:99999:7:::
Qui-Gon_Jinn:$1$88kv3/xw$DRijvml6aTjaKsgLpVJmn1:17951:0:99999:7:::
Frodo_Baggins:$1$lnEDNR6n$m2d94cd2LzktF9AJRE4OO/:17951:0:99999:7:::
Peregrin_Took:$1$6XA25/to$1m2DE3QpmufEscHCqTo5H/:17951:0:99999:7:::
Boromir:$1$QZ1dZ/8k$Wy3/ATJIwLSwaxTZhyPby/:17951:0:99999:7:::
Gimli:$1$8j98M/xN$QLRsIPwrdvb6XinS8vlFF1:17951:0:99999:7:::
Gandalf:$1$OLQB7xpI$LQqUyqacUuC/A8JHNjTAa1:17951:0:99999:7:::
Aragon:$1$f6wFyYsR$IRnG6tcX.nZqU/yIedpIL1:17951:0:99999:7:::
Legolas:$1$DRKXt/Bb$iexesv9KLYQQIve3e8Mr60:17951:0:99999:7:::
hashcat64 -m 500 --force ..\hashmd5.txt ..\rockyou.txt
World Cup
PS C:\Users\jeffsly\Desktop\3700Inffo\hash> ./hashcat64 -m 500 .\hashworld2.txt .\hashworld.txt -r .\rules\toggles5.rule --force
World cup
$1$LS/MegN7$TViOC0.lE8z0FZAgXvuvm0:uRugUaY
Session..........: hashcat
Status...........: Cracked
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: $1$LS/MegN7$TViOC0.lE8z0FZAgXvuvm0
Time.Started.....: Tue Mar 05 17:08:42 2019 (28 secs)
Time.Estimated...: Tue Mar 05 17:09:10 2019 (0 secs)
Guess.Base.......: File (.\hashworld.txt)
Guess.Mod........: Rules (.\rules\toggles5.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 172 H/s (0.53ms) @ Accel:32 Loops:15 Thr:8 Vec:1
Recovered........: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 4800/39544 (12.14%)
Rejected.........: 0/4800 (0.00%)
Restore.Point....: 0/8 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:599-600 Iteration:990-1000
Candidates.#1....: bRazIl -> sPaiN
Started: Tue Mar 05 17:08:41 2019
Stopped: Tue Mar 05 17:09:11 2019
Colors Results
ATTENTION! Pure (unoptimized) OpenCL kernels selected.
This enables cracking passwords and salts > length 32 but for the price of drastical reduced performance.
If you want to switch to optimized OpenCL kernels, append -O to your commandline.
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger disabled.
* Device #1: build_opts '-I /usr/share/hashcat/OpenCL -D VENDOR_ID=32 -D CUDA_ARCH=601 -D AMD_ROCM=0 -D VECT_SIZE=1 -D DEVICE_TYPE=4 -D DGST_R0=0 -D DGST_R1=1 -D DGST_R2=2 -D DGST_R3=3 -D DGST_ELEM=4 -D KERN_TYPE=500 -D _unroll'
Dictionary cache hit:
* Filename..: color.txt
* Passwords.: 15
* Bytes.....: 145
* Keyspace..: 225
- Device #1: autotuned kernel-accel to 128
- Device #1: autotuned kernel-loops to 250
[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit => The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Cracked
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: $1$Gmuk6/vS$8PDdC4BPWB/sOJWi6yKbz/
Time.Started.....: Thu Mar 7 09:53:12 2019 (0 secs)
Time.Estimated...: Thu Mar 7 09:53:12 2019 (0 secs)
Guess.Base.......: File (color.txt), Left Side
Guess.Mod........: File (color.txt), Right Side
Speed.Dev.#1.....: 0 H/s (1.59ms)
Recovered........: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 75/225 (33.33%)
Rejected.........: 0/75 (0.00%)
Restore.Point....: 0/15 (0.00%)
Candidates.#1....: redblue -> brown and blackblue
HWMon.Dev.#1.....: Temp: 31c Fan: 40% Util: 92% Core:1430MHz Mem:3504MHz Bus:16
Started: Thu Mar 7 09:53:08 2019
Stopped: Thu Mar 7 09:53:14 2019
jsly@server2:~/hash$ hashcat -m 500 -a 1 -o cracked-3.txt hashcolor.txt color.txt color.txt
$1$Gmuk6/vS$8PDdC4BPWB/sOJWi6yKbz/:greenblue
PS C:\Users\jeffsly\Desktop\3700Inffo\hash> ./hashcat64 -m 500 -a 1 .\hashcolor.txt .\colors16.txt .\colors16.txt --force
hashcat (v5.1.0) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) UHD Graphics 620, 3251/6503 MB allocatable, 24MCU
* Device #2: Intel(R) Core(TM) i7-8650U CPU @ 1.90GHz, skipped.
Dictionary cache built:
* Filename..: .\colors16.txt
* Passwords.: 16
* Bytes.....: 142
* Keyspace..: 16
* Runtime...: 0 secs
Dictionary cache hit:
* Filename..: .\colors16.txt
* Passwords.: 16
* Bytes.....: 141
* Keyspace..: 16
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
ATTENTION! Pure (unoptimized) OpenCL kernels selected.
This enables cracking passwords and salts > length 32 but for the price of drastically reduced performance.
If you want to switch to optimized OpenCL kernels, append -O to your commandline.
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Dictionary cache hit:
* Filename..: .\colors16.txt
* Passwords.: 16
* Bytes.....: 141
* Keyspace..: 256
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
$1$Gmuk6/vS$8PDdC4BPWB/sOJWi6yKbz/:greenblue
Session..........: hashcat
Status...........: Cracked
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: $1$Gmuk6/vS$8PDdC4BPWB/sOJWi6yKbz/
Time.Started.....: Thu Mar 07 10:23:10 2019 (0 secs)
Time.Estimated...: Thu Mar 07 10:23:10 2019 (0 secs)
Guess.Base.......: File (.\colors16.txt), Left Side
Guess.Mod........: File (.\colors16.txt), Right Side
Speed.#1.........: 262 H/s (0.66ms) @ Accel:32 Loops:15 Thr:8 Vec:1
Recovered........: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 80/256 (31.25%)
Rejected.........: 0/80 (0.00%)
Restore.Point....: 0/16 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:4-5 Iteration:990-1000
Candidates.#1....: redblue -> blackblue
Started: Thu Mar 07 10:23:09 2019
Stopped: Thu Mar 07 10:23:12 2019
PS C:\Users\jeffsly\Desktop\3700Inffo\hash>
Hashcat.potfile
244e4bc51a0eba847af61ba88f8f14cc:Ironman
ca1fa260d6480893545f85166c2b7542:adamantium
925e1c10a82159eb937406b88b947b66:Sp1derman
d9cd13973a50cfaa:PHOENIX
f72c44fed3c74f89:WE
34f6ad9bffe478e8:53ALOOG
a97823afe131e903:HOBEE53
$1$Gmuk6/vS$8PDdC4BPWB/sOJWi6yKbz/:greenblue
Digits MD5
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>
Session..........: hashcat
Status...........: Running
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: $1$rll746N2$OrFt6LuMn3nh8pponeD1f0
Time.Started.....: Thu Mar 07 15:27:06 2019 (25 mins, 32 secs)
Time.Estimated...: Thu Mar 07 20:46:47 2019 (4 hours, 54 mins)
Guess.Mask.......: ?d?d?d?d?d?d?d?d [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5213 H/s (13.55ms) @ Accel:32 Loops:15 Thr:8 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 7987200/100000000 (7.99%)
Rejected.........: 0/7987200 (0.00%)
Restore.Point....: 798720/10000000 (7.99%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:885-900
Candidates.#1....: 12157388 -> 19638834
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>
Session..........: hashcat
Status...........: Quit
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: $1$rll746N2$OrFt6LuMn3nh8pponeD1f0
Time.Started.....: Thu Mar 07 15:27:06 2019 (28 mins, 40 secs)
Time.Estimated...: Thu Mar 07 20:38:34 2019 (4 hours, 42 mins)
Guess.Mask.......: ?d?d?d?d?d?d?d?d [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5351 H/s (13.55ms) @ Accel:32 Loops:15 Thr:8 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 9203712/100000000 (9.20%)
Rejected.........: 0/9203712 (0.00%)
Restore.Point....: 915456/10000000 (9.15%)
Restore.Sub.#1...: Salt:0 Amplifier:8-9 Iteration:30-45
Candidates.#1....: 74503178 -> 77652578
Started: Thu Mar 07 15:27:04 2019
Stopped: Thu Mar 07 15:55:47 2019
PS C:\Users\jeffsly\Desktop\3700Inffo\hash> ./hashcat64 -m 500 -a 3 .\hashnum.txt ?d?d?d?d?d?d?d?d –force
Digits SHA-512
PS C:\Users\jeffsly\Desktop\3700Inffo\hash> ./hashcat64 -m 1800 -a 3 .\hashnum2.txt ?d?d?d?d?d?d?d?d --force
hashcat (v5.1.0) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) UHD Graphics 620, 3251/6503 MB allocatable, 24MCU
* Device #2: Intel(R) Core(TM) i7-8650U CPU @ 1.90GHz, skipped.
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
* Uses-64-Bit
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
ATTENTION! Pure (unoptimized) OpenCL kernels selected.
This enables cracking passwords and salts > length 32 but for the price of drastically reduced performance.
If you want to switch to optimized OpenCL kernels, append -O to your commandline.
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>
Session..........: hashcat
Status...........: Running
Hash.Type........: sha512crypt $6$, SHA512 (Unix)
Hash.Target......: $6$ykemcJN8$6Sz2oHYuEJftgzFPLvt46jjyq0uQdLTs091pi.Q...GQw10/
Time.Started.....: Thu Mar 07 16:28:01 2019 (4 secs)
Time.Estimated...: Fri Mar 08 15:56:39 2019 (23 hours, 28 mins)
Guess.Mask.......: ?d?d?d?d?d?d?d?d [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 1183 H/s (7.95ms) @ Accel:32 Loops:8 Thr:8 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/100000000 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/10000000 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:3472-3480
Candidates.#1....: 12345678 -> 19214523
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>
Presidents
$1$hbT2pXAa$XMSv7BMEZ37ixG4yPA6GJ/:h@rd!n9
Session..........: hashcat
Status...........: Cracked
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: $1$hbT2pXAa$XMSv7BMEZ37ixG4yPA6GJ/
Time.Started.....: Thu Mar 07 16:13:39 2019 (1 sec)
Time.Estimated...: Thu Mar 07 16:13:40 2019 (0 secs)
Guess.Base.......: File (.\presidentslist.txt)
Guess.Mod........: Rules (.\rules\Incisive-leetspeak.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 921 H/s (0.53ms) @ Accel:32 Loops:15 Thr:8 Vec:1
Recovered........: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 264/681428 (0.04%)
Rejected.........: 0/264 (0.00%)
Restore.Point....: 0/44 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:5-6 Iteration:990-1000
Candidates.#1....: @d@ms -> w!lson
Started: Thu Mar 07 16:13:37 2019
Stopped: Thu Mar 07 16:13:41 2019
PS C:\Users\jeffsly\Desktop\3700Inffo\hash> ./hashcat64 -m 500 .\hashpresidents.txt .\presidentslist.txt --force -r .\rules\Incisive-
leetspeak.rule
Windows
Use the rockyou list with all the different rules to get 15 passwords
Linux
Darth Vader
Windows Toggle5
Windows leetspeak
Dictionary cache built:
* Filename..: .\rockyou.txt
* Passwords.: 27181941
* Bytes.....: 139921497
* Keyspace..: 462092997
* Runtime...: 2 secs
417eaf50cfac29c3:T
5e57fc0295493699:AR
5d567324ba3ccef8:LETMEIN
877147f7d7cd2c3c:GALILEO
d9243782006c7417:NOW
54443ebf236958c8:DEATHST
1d0ff108fb745360:PERLMAN
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>
Session..........: hashcat
Status...........: Running
Hash.Type........: LM
Hash.Target......: 14a256f4f58dad24, 54443ebf236958c8
Time.Started.....: Thu Mar 07 19:03:38 2019 (55 secs)
Time.Estimated...: Thu Mar 07 19:05:00 2019 (27 secs)
Guess.Base.......: File (.\rockyou.txt)
Guess.Mod........: Rules (.\rules\leetspeak.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5659.3 kH/s (7.37ms) @ Accel:16 Loops:8 Thr:64 Vec:1
Recovered........: 8/12 (66.67%) Digests, 0/1 (0.00%) Salts
Progress.........: 309166080/462092997 (66.91%)
Rejected.........: 0/309166080 (0.00%)
Restore.Point....: 18186240/27181941 (66.91%)
Restore.Sub.#1...: Salt:0 Amplifier:16-17 Iteration:0-8
Candidates.#1....: IE -> N1
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: LM
Hash.Target......: 14a256f4f58dad24, 54443ebf236958c8
Time.Started.....: Thu Mar 07 19:03:38 2019 (1 min, 22 secs)
Time.Estimated...: Thu Mar 07 19:05:00 2019 (0 secs)
Guess.Base.......: File (.\rockyou.txt)
Guess.Mod........: Rules (.\rules\leetspeak.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5656.8 kH/s (7.00ms) @ Accel:16 Loops:8 Thr:64 Vec:1
Recovered........: 8/12 (66.67%) Digests, 0/1 (0.00%) Salts
Progress.........: 462092997/462092997 (100.00%)
Rejected.........: 0/462092997 (0.00%)
Restore.Point....: 27181941/27181941 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:16-17 Iteration:0-8
Candidates.#1....: $HEX[21212148414e4e] -> $HEX[414d4f532103]
Started: Thu Mar 07 19:03:34 2019
Stopped: Thu Mar 07 19:05:01 2019
PS C:\Users\jeffsly\Desktop\3700Inffo\hash> ./hashcat64 -m 3000 -a 0 -O --force .\hashwin.txt .\rockyou.txt -r .\rules\leetspeak.rul
e
Linux my word list
Session..........: hashcat
Status...........: Running
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: .\hashlin.txt
Time.Started.....: Fri Mar 08 08:28:23 2019 (1 sec)
Time.Estimated...: Fri Mar 08 08:29:53 2019 (1 min, 29 secs)
Guess.Base.......: File (.\blackwidow.txt)
Guess.Mod........: Rules (.\rules\best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 806 H/s (0.81ms) @ Accel:16 Loops:15 Thr:8 Vec:1
Recovered........: 0/18 (0.00%) Digests, 0/18 (0.00%) Salts
Progress.........: 1007/73458 (1.37%)
Rejected.........: 0/1007 (0.00%)
Restore.Point....: 0/53 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:19-20 Iteration:750-765
Candidates.#1....: Black Widow13 -> Dathomir13
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)
Hash.Target......: .\hashlin.txt
Time.Started.....: Fri Mar 08 08:28:23 2019 (1 min, 19 secs)
Time.Estimated...: Fri Mar 08 08:29:42 2019 (0 secs)
Guess.Base.......: File (.\blackwidow.txt)
Guess.Mod........: Rules (.\rules\best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 910 H/s (0.48ms) @ Accel:16 Loops:15 Thr:8 Vec:1
Recovered........: 1/18 (5.56%) Digests, 1/18 (5.56%) Salts
Progress.........: 73458/73458 (100.00%)
Rejected.........: 0/73458 (0.00%)
Restore.Point....: 53/53 (100.00%)
Restore.Sub.#1...: Salt:17 Amplifier:76-77 Iteration:990-1000
Candidates.#1....: B Wido -> DmirDm
Started: Fri Mar 08 08:28:22 2019
Stopped: Fri Mar 08 08:29:42 2019
PS C:\Users\jeffsly\Desktop\3700Inffo\hash> ./hashcat64 -m 500 -a 0 -o cracked.txt --force .\hashlin.txt .\blackwidow.txt -r .\rules\best64.rule
$1$WSDE1Ayz$WIlGcyU8Zk7FOofF1kpQI1:marellia
./hashcat64 -m 500 -a 0 -o cracked.txt --force .\hashlin.txt .\blackwidow.txt -r .\rules\d3ad0ne.rule
2 more found
$1$8j98M/xN$QLRsIPwrdvb6XinS8vlFF1:edddwarf
$1$OLQB7xpI$LQqUyqacUuC/A8JHNjTAa1:MaiaMaiaMaia
More attempts
Id CommandLine
-- -----------
1 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\dive.rule --show
2 cd .\Desktop\3700Inffo\hash\
3 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\dive.rule --show
4 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\T0XlC.rule
5 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\d3ad0ne.rule
6 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\leetspeak.rule
7 .\hashcat64.exe -m 1000 -a 1 .\hashwin.txt .\rockyou.txt .\rockyou.txt
8 .\hashcat64.exe -m 500 -a 0 .\hashwin.txt .\blackwidow.txt -r .\rules\best64.rule
9 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\blackwidow.txt -r .\rules\best64.rule
10 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\blackwidow.txt -r .\rules\best64.rule --show
11 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\black.txt -r .\rules\best64.rule --show
12 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\black.txt -r .\rules\best64.rule
13 .\hashcat64.exe -m 500 -w 3 -a 0 .\hashlin.txt .\black.txt -r .\rules\best64.rule
14 .\hashcat64.exe -m 500 -w 3 -a 0 .\hashlin.txt .\black.txt -r .\rules\best64.rule
15 .\hashcat64.exe -m 500 -w 3 -a 0 .\hashlin.txt .\black.txt -r .\rules\d3ad0ne.rule
16 .\hashcat64.exe -m 500 -w 3 -a 0 .\hashlin.txt .\black.txt -r .\rules\T0XlC.rule
17 .\hashcat64.exe -m 500 -w 3 -O -a 0 .\hashlin.txt .\black.txt -r .\rules\T0XlC.rule
18 .\hashcat64.exe -m 500 -w 3 -O -a 0 .\hashlin.txt .\mordor.txt -r .\rules\T0XlC.rule
19 .\hashcat64.exe -m 500 -w 3 -a 0 .\hashlin.txt .\mordor.txt -r .\rules\T0XlC.rule
20 .\hashcat64.exe -m 500 -w 3 -a 0 .\hashlin.txt .\mordor.txt -r .\rules\best64.rule
21 history
22 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\best64.rule
23 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\d3ad0ne.rule
24 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\Incisive-leetspeak.rule
25 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\rockyou-30000.rule
26 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\generated.rule
27 history
28 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\leetspeak.rule
29 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\specific.rule
30 history
31 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\os
32 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\oscommerce.rule
33 history
34 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\toggles4.rule
35 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\toggles5.rule
36 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\InsidePro-PasswordsPro.rule
37 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\T0XlCv1.rule
38 history
39 more .\hashcat.potfile
40 history
41 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\combinator.rule
42 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\generated2.rule
43 history
44 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\InsidePro-HashManager.rule
45 history
46 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\T0XlC.rule
47 history
48 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\T0XlC-insert_00-99_1950-2050_toprules_0_F.rule
49 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\T0XlC-insert_space_and_special_0_F.rule
50 history
51 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\T0XlC-insert_top_100_passwords_1_G.rule
52 .\hashcat64.exe -m 1000 -a 0 .\hashwin.txt .\rockyou.txt -r .\rules\unix-ninja-leetspeak.rule
53 .\hashcat64.exe -m 500 -w 3 -O -a 0 .\hashlin.txt .\chew.txt -r .\rules\best64.rule
54 .\hashcat64.exe -m 500 -w 3 -O -a 0 .\hashlin.txt .\chew.txt -r .\rules\best64.rule
55 .\hashcat64.exe -m 500 -w 3 -O -a 0 .\hashlin.txt .\chew.txt -r .\rules\best64.rule
56 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\chew.txt -r .\rules\best64.rule
57 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\chew.txt -r .\rules\dive.rule
58 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\blackwidow.txt -r .\rules\dive.rule
59 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\blackwidow.txt -r .\rules\d3ad0ne.rule
60 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\blackwidow.txt -r .\rules\T0XlCv1.rule
61 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\blackwidow.txt -r .\rules\Incisive-leetspeak.rule
62 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\lego.txt -r .\rules\Incisive-leetspeak.rule
63 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\lego.txt -r .\rules\Incisive-leetspeak.rule
64 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\lego.txt -r .\rules\best64.rule
65 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\lego.txt -r .\rules\d3ad0ne.rule
66 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\lego.txt -r .\rules\dive.rule
67 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\lego.txt -r .\rules\d3ad0ne.rule
68 history
69 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\lego.txt -r .\rules\rockyou-30000.rule
70 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\ara.txt -r .\rules\best64.rule
71 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\ara.txt -r .\rules\d3ad0ne.rule
72 .\hashcat64.exe -m 500 -a 0 .\hashlin.txt .\ara.txt -r .\rules\rockyou-30000.rule
redDallas03redDallas03
redDallas03