Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

Converting cRARk PCL RAR dictionary attack to hashcat-speciffic

$
0
0
Hello, I would like to recover password to my RAR archive knowing the following info:
  • It was composed using the following "words": 9, 10, Pat, Kin and the "-" character.
  • None of the words are repeated (except "-" character) e.g. AndAnd, 99, 1010)
  • I don't have info how many times they were used and in which configuration.

Till now, I've used cRARk program which uses PCL library. Contents of password.def:

Code:
$u = "my.dic"
##
$u$u$u$u$u$u$u$u$u
$u$u$u$u$u$u$u$u$u$u
$u$u$u$u$u$u$u$u$u$u$u
$u$u$u$u$u$u$u$u$u$u$u$u
$u$u$u$u$u$u$u$u$u$u$u$u$u
$u$u$u$u$u$u$u$u$u$u$u$u$u$u
$u$u$u$u$u$u$u$u$u$u$u$u$u$u$u

Contents of my.dic:

Code:
9
-
10
Pat
Kin

Which commandline parameters or script / template would you propose to be optimized as most as possible?

I've figured the following but I don't know what to do next:

Code:
hashcat64 -d 1 -w 2 -a 0 -m 12500 $RAR3$*0*xxxxxxxxxxxxxxxx*xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx my.dic

Thanks in advance for answering.

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>