Commit fa7dbaef authored by Lorenz Kälin's avatar Lorenz Kälin
Browse files

Upload New File

parent ffa7e973
Remarque: Pour le 2ème problème, j'ai utilisé un fichier appelé "crackstation.txt" que vous pouvez trouver ici:
https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
------------------------------------------------------
Problème 1 - Solution est: abcd (c.f. ligne 84)
------------------------------------------------------
┌──(kali㉿kali)-[~/Downloads/Crack Password-20211009]
└─$ hashcat -m 0 -a 3 --increment --increment-min=2 p1.md5 ?b?b?b?b?b?b
hashcat (v6.1.1) starting...
OpenCL API (OpenCL 1.2 pocl 1.6, None+Asserts, LLVM 9.0.1, RELOC, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=============================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz, 2861/2925 MB (1024 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Host memory required for this attack: 65 MB
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Name........: MD5
Hash.Target......: e2fc714c4727ee9395f324cd2e7f331f
Time.Started.....: Mon Oct 11 13:04:35 2021 (0 secs)
Time.Estimated...: Mon Oct 11 13:04:35 2021 (0 secs)
Guess.Mask.......: ?b?b [2]
Guess.Queue......: 1/5 (20.00%)
Speed.#1.........: 382.2 kH/s (0.66ms) @ Accel:1024 Loops:256 Thr:1 Vec:8
Recovered........: 0/1 (0.00%) Digests
Progress.........: 65536/65536 (100.00%)
Rejected.........: 0/65536 (0.00%)
Restore.Point....: 256/256 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-256 Iteration:0-256
Candidates.#1....: $HEX[7361] -> $HEX[ffff]
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Name........: MD5
Hash.Target......: e2fc714c4727ee9395f324cd2e7f331f
Time.Started.....: Mon Oct 11 13:04:35 2021 (0 secs)
Time.Estimated...: Mon Oct 11 13:04:35 2021 (0 secs)
Guess.Mask.......: ?b?b?b [3]
Guess.Queue......: 2/5 (40.00%)
Speed.#1.........: 133.1 MH/s (6.66ms) @ Accel:1024 Loops:256 Thr:1 Vec:8
Recovered........: 0/1 (0.00%) Digests
Progress.........: 16777216/16777216 (100.00%)
Rejected.........: 0/16777216 (0.00%)
Restore.Point....: 65536/65536 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-256 Iteration:0-256
Candidates.#1....: $HEX[7361ee] -> $HEX[ffffff]
e2fc714c4727ee9395f324cd2e7f331f:abcd
Session..........: hashcat
Status...........: Cracked
Hash.Name........: MD5
Hash.Target......: e2fc714c4727ee9395f324cd2e7f331f
Time.Started.....: Mon Oct 11 13:04:35 2021 (2 secs)
Time.Estimated...: Mon Oct 11 13:04:37 2021 (0 secs)
Guess.Mask.......: ?b?b?b?b [4]
Guess.Queue......: 3/5 (60.00%)
Speed.#1.........: 143.7 MH/s (6.41ms) @ Accel:1024 Loops:256 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests
Progress.........: 185597952/4294967296 (4.32%)
Rejected.........: 0/185597952 (0.00%)
Restore.Point....: 720896/16777216 (4.30%)
Restore.Sub.#1...: Salt:0 Amplifier:0-256 Iteration:0-256
Candidates.#1....: $HEX[7361726b] -> $HEX[ffff0f0b]
Started: Mon Oct 11 13:04:04 2021
Stopped: Mon Oct 11 13:04:38 2021
┌──(kali㉿kali)-[~/Downloads/Crack Password-20211009]
└─$
------------------------------------------------------
Problème 2 - Solution est: abcde (c.f. ligne 172)
------------------------------------------------------
┌──(kali㉿kali)-[~/Downloads/Crack Password-20211009]
└─$ hashcat -m20 -a0 p2_hash_salt.txt ../crackstation.txt 130 ⨯
hashcat (v6.1.1) starting...
OpenCL API (OpenCL 1.2 pocl 1.6, None+Asserts, LLVM 9.0.1, RELOC, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=============================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz, 2861/2925 MB (1024 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Minimim salt length supported by kernel: 0
Maximum salt length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Iterated
* Single-Hash
* Single-Salt
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Host memory required for this attack: 65 MB
Dictionary cache hit:
* Filename..: ../crackstation.txt
* Passwords.: 1212336035
* Bytes.....: 15696118781
* Keyspace..: 1212336035
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => s
Session..........: hashcat
Status...........: Running
Hash.Name........: md5($salt.$pass)
Hash.Target......: 066867e511f6c4842e45c4f57de87220:a3*d6jK?+
Time.Started.....: Mon Oct 11 22:13:14 2021 (1 min, 59 secs)
Time.Estimated...: Mon Oct 11 22:22:55 2021 (7 mins, 42 secs)
Guess.Base.......: File (../crackstation.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 2083.5 kH/s (0.42ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
Recovered........: 0/1 (0.00%) Digests
Progress.........: 249249792/1212336035 (20.56%)
Rejected.........: 0/249249792 (0.00%)
Restore.Point....: 249249792/1212336035 (20.56%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: 8yltnagamret -> 8ymotolah
066867e511f6c4842e45c4f57de87220:a3*d6jK?+:abcde
Session..........: hashcat
Status...........: Cracked
Hash.Name........: md5($salt.$pass)
Hash.Target......: 066867e511f6c4842e45c4f57de87220:a3*d6jK?+
Time.Started.....: Mon Oct 11 22:13:14 2021 (2 mins, 21 secs)
Time.Estimated...: Mon Oct 11 22:15:35 2021 (0 secs)
Guess.Base.......: File (../crackstation.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 2287.5 kH/s (0.40ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests
Progress.........: 297119744/1212336035 (24.51%)
Rejected.........: 0/297119744 (0.00%)
Restore.Point....: 297115648/1212336035 (24.51%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: Abcdchrist5 -> abcde1234~
Started: Mon Oct 11 22:12:58 2021
Stopped: Mon Oct 11 22:15:37 2021
┌──(kali㉿kali)-[~/Downloads/Crack Password-20211009]
└─$
\ No newline at end of file
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment