I have used hashcat quite a bit in the past, but it's been a while so I might be missing something simple.
I am using hashcat 4.1.0. I used fgdump to dump a list of hashes. Just to get my feet wet again, I created a simple text file with the password that I know matches to a username. For example sake let's say the password is password.
For some reason hashcat is not cracking the password using my password file. Here is the syntax I am using.
hashcat64 -a 0 -m 1000 dumpfile.pwdump password.txt
It recognizes the hashes and my password file, but it won't crack it. But when I use the following brute force syntax it cracks it:
hashcat64 -a 3 -m 1000 dumpfile.pwdump passwor?a
Any ideas?
I am using hashcat 4.1.0. I used fgdump to dump a list of hashes. Just to get my feet wet again, I created a simple text file with the password that I know matches to a username. For example sake let's say the password is password.
For some reason hashcat is not cracking the password using my password file. Here is the syntax I am using.
hashcat64 -a 0 -m 1000 dumpfile.pwdump password.txt
It recognizes the hashes and my password file, but it won't crack it. But when I use the following brute force syntax it cracks it:
hashcat64 -a 3 -m 1000 dumpfile.pwdump passwor?a
Any ideas?