Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Input and Output user/email:pass
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Okay so i have 2 issues, first of all i want to crack hashes directly from a
user:hash
or email:hash

Im doing some test and... seems like hashcat detects the user or email also like the hash, and it says 


Code:
C:Wordlist\hashcat-4.2.1>hashcat64 -m 0 hash.txt dictonary.txt
hashcat (v4.2.1) starting...

* Device #1: Intel's OpenCL runtime (GPU only) is currently broken.
            We are waiting for updated OpenCL drivers from Intel.
            You can use --force to override, but do not report related errors.
* Device #3: WARNING! Kernel exec timeout is not disabled.
            This may cause "CL_OUT_OF_RESOURCES" or related errors.
            To disable the timeout, see: https://hashcat.net/q/timeoutpatch
nvmlDeviceGetFanSpeed(): Not Supported

OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 620, skipped.
* Device #2: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz, skipped.

OpenCL Platform #2: NVIDIA Corporation
======================================
* Device #3: GeForce 940MX, 512/2048 MB allocatable, 4MCU

Hashfile 'hash.txt' on line 1 (user1:202cb962ac59075b964b07152d234b70): [b]Token length exception[/b]
Hashfile 'hash.txt' on line 2 (user2:250cf8b51c773f3f8dc8b4be867a9a02): [b]Token length exception[/b]
Hashfile 'hash.txt' on line 3 (user3:68053af2923e00204c3ca7c6a3150cf7): [b]Token length exception[/b]
No hashes loaded.

Started: Fri Sep 07 17:37:32 2018
Stopped: Fri Sep 07 17:37:33 2018

C:Wordlist\hashcat-4.2.1>

The 3 hashes are created by me, obviusly inside wordlist there are the specific passwords, im just testing.

if i just delete te "user1:" " "user2:" "user3:" then hashcat works.

Code:
202cb962ac59075b964b07152d234b70:123
250cf8b51c773f3f8dc8b4be867a9a02:456
68053af2923e00204c3ca7c6a3150cf7:789

Session..........: hashcat
Status...........: Cracked
Hash.Type........: MD5
Hash.Target......: db.txt
Time.Started.....: Fri Sep 07 17:43:02 2018 (0 secs)
Time.Estimated...: Fri Sep 07 17:43:02 2018 (0 secs)
Guess.Base.......: File (dictonary.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#3.....:     5595 H/s (0.03ms) @ Accel:64 Loops:1 Thr:1024 Vec:1
Recovered........: 3/3 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 3/3 (100.00%)
Rejected.........: 0/3 (0.00%)
Restore.Point....: 0/3 (0.00%)
Candidates.#3....: 123 -> 789
HWMon.Dev.#3.....: Temp: 38c Util: 89% Core: 862MHz Mem:2505MHz Bus:4

Started: Fri Sep 07 17:42:58 2018
Stopped: Fri Sep 07 17:43:03 2018


What i need help is to directly crack the hashes from user/email:hash and the output be each user/email with each decrypted pass.


Possible?
Code:
$ hashcat --help | egrep -i user
     --username                 |      | Enable ignoring of usernames in hashfile             |

... and:

https://hashcat.net/wiki/doku.php?id=fre...ilpassword
(09-07-2018, 06:17 PM)royce Wrote: [ -> ]
Code:
$ hashcat --help | egrep -i user
    --username                 |      | Enable ignoring of usernames in hashfile             |

... and:

https://hashcat.net/wiki/doku.php?id=fre...ilpassword


Yeah but i have first need to crack hashes and after i get the user:pass decrypted

My intention is to do in several  servers, and rsync all hashcat file to my raspberry external USB(for continue the cracking, in another server, like having backups you know? so i dont loose anything) , so, if i setup a crontab thath every minute run these would i have a output file updated every min with user:pass format? and these will cause to stop the hash cracking?  (im pretty new to hashcat, just saying)
Crontab Job:

* * * * * ./home/user/hashcatdir/hashcat64.bin -m 0 --username --potfile-path md5.pot --show -o formatted_output.txt --outfile-format 2 original_MD5_hashes.txt
And what about cracking from hashcat with format

user:email:hash

? its possible?
no
I guess you could simulate it by replacing the first colon with some other separator, as in

user$email:hash
(09-08-2018, 04:15 PM)royce Wrote: [ -> ]I guess you could simulate it by replacing the first colon with some other separator, as in

user$email:hash

thanks, what about the crontab idea? or any idea for get the user:cracked password every minute so i can rsync to my rasp the cracked results in user:pass ?
I format in user$$$$email:hash and i get the token lenght exception.
When i crack with user:pass i get some lines with token length exeption cause they are some in bad format(around 200 from 27 million) but when i try user$$$$email:hash i get every line with token lenght exception