Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: bitlocker Hash-types Mask Attack Unable to crack the password correctly
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello, everyone! 
I would like to ask what's wrong with the following part?
Thanks for your answers!

My password is set to 88888aaa, when I cracking it, I used 88888?l?l?, but the program shows "Exhausted".

I WOULD like to Find Out what's wrong with my operating.



After a simple test, three consecutive? L? L? L hashcats will produce incorrect results.



Session..........: hashcat

Status...........: Exhausted

Hash.Name........: BitLocker

Hash.Target......: $bitlocker$0$16$**************$10...975e6d

Time.Started.....: Tue Mar 10 23:13:22 2020 (10 secs)

Time.Estimated...: Tue Mar 10 23:13:32 2020 (0 secs; Runtime limited: 14 mins, 50 secs)

Guess.Mask.......: 88888?l?l?l [8]

Guess.Queue......: 1/1 (100.00%)

Speed.#1.........: 1797 H/s (38.08ms) @ Accel:1 Loops:4096 Thr:1024 Vec:1

Recovered........: 0/1 (0.00%) Digests

Progress.........: 17576/17576 (100.00%)

Rejected.........: 0/17576 (0.00%)

Restore.Point....: 17576/17576 (100.00%)

Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:1044480-1048576

Candidates.#1....: 88888ane -> 88888qgx

Hardware.Mon.#1..: Temp: 45c Fan: 0% Util:100% Core:1890MHz Mem:6801MHz Bus:16

Started: Tue Mar 10 23:13:14 2020

Stopped: Tue Mar 10 23:13:33 2020

PS C:\Users\ly\Desktop\hashcat-5.1.0> .\hashcat -a 3 -m 22100 88888.txt --increment --increment-min 8 --increment-max 12 88888?l?l?l
Translating this so maybe someone here can answer the question:

This user is attempting to break the expected password "88888aaa" with the mask "88888?l?l?l" but is running to exhaustion without a crack before this happens. They are wondering why this may be the case with the commands that they have listed.
There is not enough information provided to reproduce the problem. We need the hashes for the volume.
[quote =“ atom” pid ='47881'dateline ='1583914528']
没有提供足够的信息来重现该问题。我们需要大量的哈希值。
[/引用]

reproduce is very simple,You just need to encrypt with bitlocker, and the password is set to the last three digits in consecutive lowercase letters,Mask is set to when cracking with hashcat   ?l?l?l


In other cases, I have not tested for the time being, I will give you a reply after the test
The forum rules are very clear that it is not allowed to use any other language other than English on this forum.
https://hashcat.net/forum/announcement-2.html

Rules are rules and they need to be respected. Please stick to the rules, otherwise we need to remove the posts and ban you (this is what the normal process is, if somebody doesn't respect the forum rules). It doesn't matter what the topic is and whether it is an important report etc
(03-11-2020, 10:15 AM)atom Wrote: [ -> ]There is not enough information provided to reproduce the problem. We need the hashes for the volume.


My password is set to 20200313, mask attack use 202?d?d?d?d?d,But can't crack


Session..........: hashcat

Status...........: Exhausted

Hash.Name........: BitLocker

Hash.Target......: $bitlocker$0$16$******************$10...b8e666

Time.Started.....: Fri Mar 13 18:02:30 2020 (52 secs)

Time.Estimated...: Fri Mar 13 18:03:22 2020 (0 secs)

Guess.Mask.......: 202?d?d?d?d?d [8]

Guess.Queue......: 1/1 (100.00%)

Speed.#1.........:    1916 H/s (39.16ms) @ Accel:1 Loops:4096 Thr:1024 Vec:1

Recovered........: 0/1 (0.00%) Digests

Progress.........: 100000/100000 (100.00%)

Rejected.........: 0/100000 (0.00%)

Restore.Point....: 100000/100000 (100.00%)

Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:1044480-1048576

Candidates.#1....: 20230984 -> 20294949

Hardware.Mon.#1..: Temp: 63c Fan: 28% Util: 94% Core:1860MHz Mem:6801MHz Bus:16









mask attack use 2020?d?d?d?d, Crack correctly





Session..........: hashcat

Status...........: Cracked

Hash.Name........: BitLocker

Hash.Target......: $bitlocker$0$******************$10...b8e666

Time.Started.....: Fri Mar 13 18:06:38 2020 (5 secs)

Time.Estimated...: Fri Mar 13 18:06:43 2020 (0 secs)

Guess.Mask.......: 2020?d?d?d?d [8]

Guess.Queue......: 1/1 (100.00%)

Speed.#1.........:    1950 H/s (19.93ms) @ Accel:1 Loops:4096 Thr:1024 Vec:1

Recovered........: 1/1 (100.00%) Digests

Progress.........: 10000/10000 (100.00%)

Rejected.........: 0/10000 (0.00%)

Restore.Point....: 0/10000 (0.00%)

Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:1044480-1048576

Candidates.#1....: 20200000 -> 20204949
Hardware.Mon.#1..: Temp: 55c Fan:  0% Util: 99% Core:1800MHz Mem:6801MHz Bus:16
Are you able to share this hash in a private message (PM) with us ?

Alternatively, could you generate an example hash that also is uncrackable (for which you know the password and are able to share it in a private message) ?

Just to exclude any other faults... do you experience other problems too with other hash types or are you using --force (you shouldn't use --force) ? Can you confirm and are 100% sure that otherwise (with other hash types etc) your system works perfectly fine ?