Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

How to recover Joomla 1.5 password?

$
0
0
Hi,

I have Joomla hashes, and cracking with my laptop gpu - NVIDIA GeForce GT750M

the script I have come up with is this

cudaHashcat64 -a 3 -m 11 --increment --increment-min=4 --increment-max=10 -o crack/cracked.txt hashes.txt -1 ?l?d ?1?1?1?1?1?1?1?1?1?1

I believe this should attempt to bruteforce any password containing either letters or digits with length of 4 - 10

Is that correct?



Output looks like this


Session.Name...: cudaHashcat
Status.........: Running
Input.Mode.....: Mask (?1?1?1?1?1?1?1) [7]
Hash.Target....: File (hashes.txt)
Hash.Type......: Joomla < 2.5.18
Time.Started...: Fri Apr 17 11:09:35 2015 (15 mins, 37 secs)
Time.Estimated.: Fri Apr 17 11:39:31 2015 (13 mins, 27 secs)
Speed.GPU.#1...: 44694.3 kH/s
Recovered......: 0/13 (0.00%) Digests, 0/13 (0.00%) Salts
Progress.......: 547352477696/1018734133248 (53.73%)
Skipped........: 0/547352477696 (0.00%)
Rejected.......: 0/547352477696 (0.00%)
Restore.Point..: 851968/1679616 (50.72%)
HWMon.GPU.#1...: 97% Util, 84c Temp, N/A Fan

[s]tatus [p]ause [r]esume [b]ypass [q]uit =>

I double checked my syntax so im pretty sure im doing it right, its just the "[7]" after mask that makes me wonder if its only bruteforcing a length of 7 ...

and also because I havent cracked anything yet idk if its working

EDIT the mask changed to 8 now so im guessing it is working correctly. If i dont crack anything then I guess I can try adding specials to the bruteforce. So is Joomla is a very weak hash? Seems easy if 10 character passwords can be bruteforced with a little laptop GPU

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>