Okay so i have 2 issues, first of all i want to crack hashes directly from a
user:hash
or email:hash
Im doing some test and... seems like hashcat detects the user or email also like the hash, and it says
The 3 hashes are created by me, obviusly inside wordlist there are the specific passwords, im just testing.
if i just delete te "user1:" " "user2:" "user3:" then hashcat works.
What i need help is to directly crack the hashes from user/email:hash and the output be each user/email with each decrypted pass.
Possible?
user:hash
or email:hash
Im doing some test and... seems like hashcat detects the user or email also like the hash, and it says
Code:
C:Wordlist\hashcat-4.2.1>hashcat64 -m 0 hash.txt dictonary.txt
hashcat (v4.2.1) starting...
* Device #1: Intel's OpenCL runtime (GPU only) is currently broken.
We are waiting for updated OpenCL drivers from Intel.
You can use --force to override, but do not report related errors.
* Device #3: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
nvmlDeviceGetFanSpeed(): Not Supported
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 620, skipped.
* Device #2: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz, skipped.
OpenCL Platform #2: NVIDIA Corporation
======================================
* Device #3: GeForce 940MX, 512/2048 MB allocatable, 4MCU
Hashfile 'hash.txt' on line 1 (user1:202cb962ac59075b964b07152d234b70): [b]Token length exception[/b]
Hashfile 'hash.txt' on line 2 (user2:250cf8b51c773f3f8dc8b4be867a9a02): [b]Token length exception[/b]
Hashfile 'hash.txt' on line 3 (user3:68053af2923e00204c3ca7c6a3150cf7): [b]Token length exception[/b]
No hashes loaded.
Started: Fri Sep 07 17:37:32 2018
Stopped: Fri Sep 07 17:37:33 2018
C:Wordlist\hashcat-4.2.1>
The 3 hashes are created by me, obviusly inside wordlist there are the specific passwords, im just testing.
if i just delete te "user1:" " "user2:" "user3:" then hashcat works.
Code:
202cb962ac59075b964b07152d234b70:123
250cf8b51c773f3f8dc8b4be867a9a02:456
68053af2923e00204c3ca7c6a3150cf7:789
Session..........: hashcat
Status...........: Cracked
Hash.Type........: MD5
Hash.Target......: db.txt
Time.Started.....: Fri Sep 07 17:43:02 2018 (0 secs)
Time.Estimated...: Fri Sep 07 17:43:02 2018 (0 secs)
Guess.Base.......: File (dictonary.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#3.....: 5595 H/s (0.03ms) @ Accel:64 Loops:1 Thr:1024 Vec:1
Recovered........: 3/3 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 3/3 (100.00%)
Rejected.........: 0/3 (0.00%)
Restore.Point....: 0/3 (0.00%)
Candidates.#3....: 123 -> 789
HWMon.Dev.#3.....: Temp: 38c Util: 89% Core: 862MHz Mem:2505MHz Bus:4
Started: Fri Sep 07 17:42:58 2018
Stopped: Fri Sep 07 17:43:03 2018
What i need help is to directly crack the hashes from user/email:hash and the output be each user/email with each decrypted pass.
Possible?