Hashcat Signature u...
 
Notifications
Clear all

Hashcat Signature unmatched No hashes loaded.

9 Posts
3 Users
2 Likes
18 K Views
(@tony75)
Posts: 33
Eminent Member
Topic starter
 

Hi

I wonder why i get this error " Signature unmatched No hashes loaded." ?

 

C:\john-1.9.0-jumbo-1-win64\run>perl 7z2john.pl Secret.7z > Secret.hash

C:\john-1.9.0-jumbo-1-win64\run>


Then


C:\hashcat-6.1.1>hashcat.exe -a 3 -m 11600 Secret.hash ?a?a?a?a?a?a?a?a --force
hashcat (v6.1.1) starting...

You have enabled --force to bypass dangerous warnings and errors!
This can hide serious problems and should only be done when debugging.
Do not report hashcat issues encountered when using --force.
OpenCL API (OpenCL 2.1 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics , 6416/6476 MB (3238 MB allocatable), 24MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashfile 'Secret.hash' on line 1 (Secret...b6076254501e19133aaf7d886$233$00): Signature unmatched
No hashes loaded.

Started: Fri Oct 09 01:30:38 2020
Stopped: Fri Oct 09 01:30:39 2020

C:\hashcat-6.1.1>
 
Posted : 08/10/2020 11:35 pm
Omnius
(@omnius)
Posts: 39
Eminent Member
 

Does the format of the outputted hash match what's shown in the examples?

https://hashcat.net/wiki/doku.php?id=example_hashes

 

Is this a test file or something you've obtained?

 

 

This post was modified 3 years ago 2 times by Omnius
 
Posted : 09/10/2020 6:39 am
Tony75 reacted
(@tony75)
Posts: 33
Eminent Member
Topic starter
 

@omnius This is test file and I zipped with 7z.

The 7-Zip has hashmode 11600 

   
This post was modified 3 years ago 2 times by Tony75
 
Posted : 09/10/2020 12:42 pm
Omnius
(@omnius)
Posts: 39
Eminent Member
 

Does the outputted hash match the format provided in the examples?

It looks like your hash starts with "Secret", if the filename is inside your .hash file I would remove it.

 

Try using this to extract the hash instead, there is a Perl and .exe version.

https://github.com/philsmd/7z2hashcat/releases

This post was modified 3 years ago by Omnius
 
Posted : 09/10/2020 1:00 pm
(@tony75)
Posts: 33
Eminent Member
Topic starter
 
@omnius The outputted hash is: Secret.7z:$7z$2$19$0$$16$08675781a95ffc88d93699ad0cf8beb4$....

I testet  with Secret.7z I got the error above.

Thanks for your link I'm using 7z2hashcat

$7z$2$19$0$$16$08675781a95ffc88d93699ad0cf8beb4$

But this time got this message

C:\hashcat-6.1.1>hashcat -a 3 -m 11600 Secret.hash ?a?a?a?a?a?a?a?av --force

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force

ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Host memory required for this attack: 122 MB
This post was modified 3 years ago by Tony75
 
Posted : 09/10/2020 11:39 pm
Omnius
(@omnius)
Posts: 39
Eminent Member
 

@tony75

 

I don't see an error in that output, but that 'v' at the end of your mask might be breaking something?

You could try adding -O as I think that reduces you to around 24 chars but improves speed.

 

 
Posted : 12/10/2020 12:43 pm
Tony75 reacted
(@tony75)
Posts: 33
Eminent Member
Topic starter
 

@omnius

It seems I have still same issue!

C:\hashcat-6.1.1>hashcat -a 3 -m 11600 Secret.hash ?a?a?a?a?a?a?a?a -O --force
hashcat (v6.1.1) starting...

You have enabled --force to bypass dangerous warnings and errors!
This can hide serious problems and should only be done when debugging.
Do not report hashcat issues encountered when using --force.
OpenCL API (OpenCL 2.1 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics 660, 6414/6476 MB (3238 MB allocatable), 24MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 20

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Host memory required for this attack: 122 MB

[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>

Session..........: hashcat
Status...........: Running
Hash.Name........: 7-Zip
Hash.Target......: $7z$2$19$0$$16$61cd2acf48ff5c3a5776229281f053f8$284...$34$00
Time.Started.....: Tue Oct 13 20:52:30 2020, (59 secs)
Time.Estimated...: Next Big Bang, (> 10 years)
Guess.Mask.......: ?a?a?a?a?a?a?a?a [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 58 H/s (25.28ms) @ Accel:1 Loops:4096 Thr:8 Vec:4
Recovered........: 0/1 (0.00%) Digests
Progress.........: 3264/6634204312890625 (0.00%)
Rejected.........: 0/3264 (0.00%)
Restore.Point....: 0/69833729609375 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:17-18 Iteration:356352-360448
Candidates.#1....: farierin -> fooverin

[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>

 

 
Posted : 13/10/2020 6:56 pm
(@athulin)
Posts: 1156
Noble Member
 

@tony75

Could you please identify your current issue?

It started out as a signature failure, but that seems to have been sorted out. Aas far as I can see from your latest post, you've got everything working. What is it that you think is wrong, and what should it be instead, in your opinion?

 
Posted : 14/10/2020 5:09 am
Omnius
(@omnius)
Posts: 39
Eminent Member
 

@tony75

 

That looks to be working, you are however trying to crack on what looks like an on-board GPU. Which is why it says it will take so long to crack. 

7zip is a very slow algo to crack, especially with mask attacks. Since you created the zip, you could try making the mask "match" your password e.g. ?u?l?l?l?d?d?s?s. Though I fear this will still take a very long time with an onboard card.

 

 

 

 

This post was modified 3 years ago by Omnius
 
Posted : 14/10/2020 6:49 am
Share: