I have the task to crack a bunch of passwords like:
- $1$V5l3qvml$Q.fDn30gGhjcEIZH8utah/
- $1$DcuX.dRK$bR4utyGQ4ET4sobpMMtfo0
- $1$WbXWIqFu$Qu1fT/MmTIvSUz4xw4mlI0
- $1$8Y7TfkZ5$LnuF99mgFbV1wvQ61dMZB1
I was only told that these were Linux-like encrypted (I have removed the username: from the front, e.g. sBerhhard: and ::1:0:1:1::: from the end). I have read here that these are shadow style password hashes. Furthermore, I have tried to use hashcat 0.49 to crack these passwords. However, when trying the following command I got the following result and I cannot figure out why: hashcat-cli64 -m 10 -o found.txt ....\1 dictionaries\Top10000.dic
I have also tried the example from here, and it worked, so I probably have an error in the command.
I am using the dictionary of InsidePro. Am I using the right m parameter (md5($pass.$salt))? If not, what would be the proper one?
Aucun commentaire:
Enregistrer un commentaire