Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7673

How would I parse through this to get the correct info?

$
0
0
Hey all,

Sorry for the super noob question.  I am in a university Info Security class, and the professor asked me to see if I could crack all these generated passwords (~400) using my 970GTX.  No one in the class has had a card powerful enough yet.

So with that said, I am very new to using anything.  In our in-class lab, we used John the Ripper to go through about 30 of them brute-force.  He asked me to try and use hascat and see if I could pull all of them out.

Here is how the hash is given to us:

user0:e0XXjUXXr6XFU:0:0:user #0:/var/home/user0:/bin/eggshell

How would I tell my cudaHashcat 1.37 to parse through this with user0 being username and then obviously try and crack the hash?  I've tried looking up guides and video's, but most of them are outdated and are not using a version near this one, or do not go into enough detail to explain what is actually happening.

Any guidance or references would be greatly appreciated!  Thanks!

Viewing all articles
Browse latest Browse all 7673

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>