Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Line-length Exception (mode)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello Community! 

I'm trying to crack a hash from a Fortigate OS user account, but noticed the -m 7000 is no longer valid within hashcat's latest build. I'm unsure when this was dropped off, but curious if there's a known alternative. 

Thanks!
-Kasha
-m 7000 = Fortigate (FortiOS) was never implemented in oclHashcat/cudaHashcat and therefore is currently also not available in hashcat 3.10 (since hashcat 3.00 basically improved oclHashcat to support OpenCL-compatible CPUs too and is therefore not a direct successor of hashcat-legacy).

You can download hashcat-legacy and use your CPU to crack those hashes: https://github.com/hashcat/hashcat-legacy/releases (or you could compile hashcat-legacy from git if you want).

If you really insist that this should be implemented into hashcat 3+, you should open a github issue (but not sure how many requests for this algorithm we get.... therefore it might at least take some time until somebody implements it into hashcat 3+, if at all).