Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: PBKDF2-SHA512 (Hash type 7100) Command Syntax
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I'm a very new user of Hashcat and I'm trying to use it for hash type 7100 (PBKDF2-SHA512) in order to recover an administrator password on my Mac running OSX El Capitan.

I followed the instructions of the top post here, and I have a hash.txt file of this format: $ml$<iterations(integer)>$<salt(hex)>$<entropy(hex)>.  I have placed this file in the hashcat folder on my PC.

Sorry if this is a very basic question, but how would you format the command in command prompt to perform a dictionary attack based on the information in the hash file? (Assuming I have a wordlist.) The answer on the StackExchange forum only had a brute force attack shown as an example, and even that didn't work when I tried to run it ( hashcat64.exe -m 7100 hash.txt -a 3 ?d?d?d?d ) .

The reason I'm trying to do a dictionary attack is because the password is up to 12 characters long.

Thanks for any help!
Attack mode '0' (-a 0) is the "straight" / dictionary attack.

Running

Code:
hashcat --help

... at the bottom, you'll see an example:

Code:
Wordlist         | $P$   | hashcat -a 0 -m 400 example400.hash example.dict