Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Pdf crack issue
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I pull down a pdf file from a public site that allows one to view the pdf but not print without a paid password. I save the file and run pdftohashcat.py and get: $pdf$2*3*128*-8*1*16*9ce0<redacted>a204. I run oclhashcat and it cracks instantly with this output:$pdf$2*3*128*-8*1*16*9ce0<redacted>aa204:

Which I read as, "blank, no entry"

I attempt to enter this when the password is requested when I attempt to print the file but it is rejected. What am I not getting? Thanks.
(02-05-2016, 07:46 PM)simplyslow Wrote: [ -> ]Did you check your .pot file for the password?


I pull down a pdf file from a public site that allows one to view the pdf but not print without a paid password. I save the file and run pdftohashcat.py and get: $pdf$2*3*128*-8*1*16*9ce0<redacted>a204. I run oclhashcat and it cracks instantly with this output:$pdf$2*3*128*-8*1*16*9ce0<redacted>aa204:

Which I read as, "blank, no entry"

I attempt to enter this when the password is requested when I attempt to print the file but it is rejected. What am I not getting? Thanks.
(02-05-2016, 11:01 PM)Jiminy Wrote: [ -> ]
(02-05-2016, 07:46 PM)simplyslow Wrote: [ -> ]Did you check your .pot file for the password?


I pull down a pdf file from a public site that allows one to view the pdf but not print without a paid password. I save the file and run pdftohashcat.py and get: $pdf$2*3*128*-8*1*16*9ce0<redacted>a204. I run oclhashcat and it cracks instantly with this output:$pdf$2*3*128*-8*1*16*9ce0<redacted>aa204:

Which I read as, "blank, no entry"

I attempt to enter this when the password is requested when I attempt to print the file but it is rejected. What am I not getting? Thanks.

Yes. .pot file is the same output as the above result.
I created a test file with a permissions password only.  Cudahashcat 2.01 also came back with "cracked" again with nothing after the hash in the pot file.

Unless I'm mistaken and also missing something, I don't believe hashcat can crack a "permissions/owner" password.  Just the "user" password.  Perhaps some of the experts or one of the developers can verify this.

There are numerous other programs on the market that can remove "permissions" restrictions, however that is not a discussion for this forum.



(02-06-2016, 05:46 AM)simplyslow Wrote: [ -> ]
(02-05-2016, 11:01 PM)Jiminy Wrote: [ -> ]
(02-05-2016, 07:46 PM)simplyslow Wrote: [ -> ]Did you check your .pot file for the password?


I pull down a pdf file from a public site that allows one to view the pdf but not print without a paid password. I save the file and run pdftohashcat.py and get: $pdf$2*3*128*-8*1*16*9ce0<redacted>a204. I run oclhashcat and it cracks instantly with this output:$pdf$2*3*128*-8*1*16*9ce0<redacted>aa204:

Which I read as, "blank, no entry"

I attempt to enter this when the password is requested when I attempt to print the file but it is rejected. What am I not getting? Thanks.

Yes. .pot file is the same output as the above result.