06-21-2012, 08:51 PM
Hi, I figured out this great way to depot passwords from your hashcat.pot file from: Hash[:Salt]assword to Password only.
This way doesn't mess up with passwords having : in them.
This method depends on only two tools and two steps:
Usage:
We take the advantage of the fact that oclHashcat-plus doesn't crack < 15 passwords.
In action:
However, it's not literally perfect, there are some very rare situations where the password is extracted incorrectly. E.g. It will not work if the password was exactly 15 in length and has : in it.
This way doesn't mess up with passwords having : in them.
This method depends on only two tools and two steps:
- cutb from hashcat-utils.
- cut from UnixTextTools.
Usage:
Code:
cutb -15 15 < hashcat.pot | cut -d: -f2-
In action:
Code:
type 1.txt
202cb962ac59075b964b07152d234b70:123
f3314706ed3f1b46b707eae089059073:vxWwrz@6G|zvq`?tj&&UA43|$9T=BH:123
d350da89ea9826755dc68b42a4c98e67:My:Pass:Word
262d5bcbffd37c91867953a86ca5bd07:ff:My:Pass:Word
7ae40a437c2be08077b28cae34271eeb:goituH0zQUh4RSQyLucRy3hjxPbckz:My:Pass:Word
1f5428ead754c3528e344698fca10bfe:;Qe4#:My:Pass:Word
$H$9XNALAYoBpx7JvT.0qG28I9W68vPyx.:My:Pass:Word
7d763cf6401728f54f2fb8032f8ae86e:::::::wtf
dd2a42f195358b2a8193cb4cb631e7e3:toolongpassword
cutb -15 15 < 1.txt | cut -d: -f2-
123
123
My:Pass:Word
My:Pass:Word
My:Pass:Word
My:Pass:Word
My:Pass:Word
::::::wtf
toolongpassword
However, it's not literally perfect, there are some very rare situations where the password is extracted incorrectly. E.g. It will not work if the password was exactly 15 in length and has : in it.