我正在尝试使用这两个密码来测试启动 hashcat:
$ echo "Password" | md5sum | tr -d ' -' >> target_hashes.txt
$ echo "HELLO" | md5sum | tr -d ' -' >> target_hashes.txt
$ ls
rockyou.txt target_hashes.txt
$ cat target_hashes.txt
29f33cab54c2a8858885b95d8fbb7ff1
0084467710d2fc9d8a306e14efbe6d0f
$ hashcat -a 0 -m 0 -o cracked.txt target_hashes.txt rockyou.txt
hashcat (v6.1.1) starting...
Hashes: 2 digests; 2 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Dictionary cache hit:
* Filename..: rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921498
* Keyspace..: 14344385
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Name........: MD5
Hash.Target......: target_hashes.txt
Time.Started.....: Wed Nov 18 12:40:22 2020 (17 secs)
Time.Estimated...: Wed Nov 18 12:40:39 2020 (0 secs)
Guess.Base.......: File (rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 843.6 kH/s (1.31ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
Recovered........: 0/2 (0.00%) Digests
Progress.........: 14344385/14344385 (100.00%)
Rejected.........: 0/14344385 (0.00%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: $HEX[206b72697374656e616e6e65] -> $HEX[042a0337c2a156616d6f732103]
Started: Wed Nov 18 12:40:18 2020
Stopped: Wed Nov 18 12:40:41 2020
它们显然存在于字典中,但不知何故 hashcat 没有恢复它们。我已经在 WSL 和 Kali 本身上尝试过这个:两者都没有结果。