Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Brute-force $HEX
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Dictionary attack is working with --hex-salt i get correct $HEX[310032003300340035003600] 123456 as result
Code:
hashcat64 -m 160 --hex-salt --encoding-to=utf-16le hash.txt dict.txt
But when i do brute-force with the same hash and salt i get no result, here is my syntax
Code:
hashcat64 hash.txt -m 160 --hex-salt --encoding-to=utf-16le -a 3 -1 ?d ?1?1?1?1?1?1
Is my brute-force syntax wrong cause dictonary is working?
I'm not entirely sure but I think encoding-from/encoding-to does only work with wordlists.
Thanks for info. Is there any other way to use brute-force in this case?
Here is an example hash : salt hex password is $HEX[6800610073006800630061007400]  hashcat
Code:
30263e435f8ce1b2fcdb9c559941783e337d2168:548afbb1fff2e98e2483209cf891546db5be25ef04868d2dd7c8c673d6c5826e
Well, there is no easy way to do so (other than generating the candidates externally and piping them into hashcat which will slow down your attack). You can craft a mask that is using multiple bytes per character manually.