Cracking harder passwords
Let’s look at some harder passwords with Hashcat.
➢ Take the following hashes and save them in the home directory as “Hardhash.txt”:
31d6cfe0d16ae931b73c59d7e0c089c0
2e4dbf83aa056289935daea328977b20
d6e0a7e89da72150d1152563f5b89dbe
317a96a1018609c20b4ccb69718ad6e7
2e520e18228ad8ea4060017234af43b2
➢ Now type, “hashcat -D 1 -m 1000 Hardhash.txt rockyou.txt -o Hardcracked.txt --force”
Everything on the line is the same as before, except we changed the hash name to the new “Hardhash.txt” file and changed the output filename to “hardcracked.txt”.
➢ And in a few seconds, we see the following screenshot:
Okay, it ran for about the same amount of time, but this time it was only able to recover 2 of the 5 hashes. If we run the cat command on the “hardcracked.txt” file, we see something odd:
...