12-30-2017, 03:54 PM
Hi all,
I'm new to hashcat and trying to learn how to use the tool.
I downloaded a file of hashes here: https://www.adeptus-mechanicus.com/codex/...shpass.php Specifically, I downlaoded the battielfield hashes file and saved it as bfield.hash.
Next, I downloaded a list of common passwords here: https://wiki.skullsecurity.org/index.php...=Passwords Specifically, it is phpbb.txt
Now, if i run the command:
./hashcat -m 0 bfield.hash phpbb.txt -o plain_wordlist_results.txt
Everything works great: I get the inverted MD5 hashes that I am able to with the ditionary phpbb.txt.
Where am I struggling, is cracking my own test examples. For instance, if I open my bfield.hash file in a simple text editor and literally copy and paste all the passwords into a new file, say, hashes.txt, and then run
./hashcat -m 0 hashes.txt phpbb.txt -o plain_wordlist_results.txt
I get a line length exception error.
So this must mean that the .hash file is formatted correctly while my custom file is not. What is happening?
Many thanks!
I'm new to hashcat and trying to learn how to use the tool.
I downloaded a file of hashes here: https://www.adeptus-mechanicus.com/codex/...shpass.php Specifically, I downlaoded the battielfield hashes file and saved it as bfield.hash.
Next, I downloaded a list of common passwords here: https://wiki.skullsecurity.org/index.php...=Passwords Specifically, it is phpbb.txt
Now, if i run the command:
./hashcat -m 0 bfield.hash phpbb.txt -o plain_wordlist_results.txt
Everything works great: I get the inverted MD5 hashes that I am able to with the ditionary phpbb.txt.
Where am I struggling, is cracking my own test examples. For instance, if I open my bfield.hash file in a simple text editor and literally copy and paste all the passwords into a new file, say, hashes.txt, and then run
./hashcat -m 0 hashes.txt phpbb.txt -o plain_wordlist_results.txt
I get a line length exception error.
So this must mean that the .hash file is formatted correctly while my custom file is not. What is happening?
Many thanks!