0

我正在尝试使用这两个密码来测试启动 hashcat:

$ echo "Password" | md5sum | tr -d ' -' >> target_hashes.txt
$ echo "HELLO" | md5sum | tr -d ' -' >> target_hashes.txt
$ ls
rockyou.txt  target_hashes.txt
$ cat target_hashes.txt
29f33cab54c2a8858885b95d8fbb7ff1
0084467710d2fc9d8a306e14efbe6d0f
$ hashcat -a 0 -m 0 -o cracked.txt target_hashes.txt rockyou.txt
hashcat (v6.1.1) starting...

Hashes: 2 digests; 2 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash

Dictionary cache hit:
* Filename..: rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921498
* Keyspace..: 14344385

Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Name........: MD5
Hash.Target......: target_hashes.txt
Time.Started.....: Wed Nov 18 12:40:22 2020 (17 secs)
Time.Estimated...: Wed Nov 18 12:40:39 2020 (0 secs)
Guess.Base.......: File (rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   843.6 kH/s (1.31ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
Recovered........: 0/2 (0.00%) Digests
Progress.........: 14344385/14344385 (100.00%)
Rejected.........: 0/14344385 (0.00%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: $HEX[206b72697374656e616e6e65] -> $HEX[042a0337c2a156616d6f732103]

Started: Wed Nov 18 12:40:18 2020
Stopped: Wed Nov 18 12:40:41 2020

它们显然存在于字典中,但不知何故 hashcat 没有恢复它们。我已经在 WSL 和 Kali 本身上尝试过这个:两者都没有结果。

4

1 回答 1

0

尝试echo -n而不是echo否则您的密码将包含尾随\n(换行符),Hashcat 不会尝试匹配。

于 2020-11-18T17:48:29.443 回答