Hi
I wonder why i get this error " Signature unmatched No hashes loaded." ?
Â
C:\john-1.9.0-jumbo-1-win64\run>perl 7z2john.pl Secret.7z > Secret.hash
C:\john-1.9.0-jumbo-1-win64\run>
Then
C:\hashcat-6.1.1>hashcat.exe -a 3 -m 11600 Secret.hash ?a?a?a?a?a?a?a?a --force
hashcat (v6.1.1) starting...
You have enabled --force to bypass dangerous warnings and errors!
This can hide serious problems and should only be done when debugging.
Do not report hashcat issues encountered when using --force.
OpenCL API (OpenCL 2.1 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics , 6416/6476 MB (3238 MB allocatable), 24MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashfile 'Secret.hash' on line 1 (Secret...b6076254501e19133aaf7d886$233$00): Signature unmatched
No hashes loaded.
Started: Fri Oct 09 01:30:38 2020
Stopped: Fri Oct 09 01:30:39 2020
C:\hashcat-6.1.1>
Does the format of the outputted hash match what's shown in the examples?
https://hashcat.net/wiki/doku.php?id=example_hashes
Â
Is this a test file or something you've obtained?
Â
Â
Does the outputted hash match the format provided in the examples?
It looks like your hash starts with "Secret", if the filename is inside your .hash file I would remove it.
Â
Try using this to extract the hash instead, there is a Perl and .exe version.
@omnius The outputted hash is: Secret.7z:$7z$2$19$0$$16$08675781a95ffc88d93699ad0cf8beb4$....
I testet with Secret.7z I got the error above.
Thanks for your link I'm using 7z2hashcat
$7z$2$19$0$$16$08675781a95ffc88d93699ad0cf8beb4$
But this time got this message
C:\hashcat-6.1.1>hashcat -a 3 -m 11600 Secret.hash ?a?a?a?a?a?a?a?av --force
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Host memory required for this attack: 122 MB
It seems I have still same issue!
C:\hashcat-6.1.1>hashcat -a 3 -m 11600 Secret.hash ?a?a?a?a?a?a?a?a -O --force
hashcat (v6.1.1) starting...
You have enabled --force to bypass dangerous warnings and errors!
This can hide serious problems and should only be done when debugging.
Do not report hashcat issues encountered when using --force.
OpenCL API (OpenCL 2.1 ) - Platform #1 [Intel(R) Corporation]
=============================================================
* Device #1: Intel(R) UHD Graphics 660, 6414/6476 MB (3238 MB allocatable), 24MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 20
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Host memory required for this attack: 122 MB
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>
Session..........: hashcat
Status...........: Running
Hash.Name........: 7-Zip
Hash.Target......: $7z$2$19$0$$16$61cd2acf48ff5c3a5776229281f053f8$284...$34$00
Time.Started.....: Tue Oct 13 20:52:30 2020, (59 secs)
Time.Estimated...: Next Big Bang, (> 10 years)
Guess.Mask.......: ?a?a?a?a?a?a?a?a [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 58 H/s (25.28ms) @ Accel:1 Loops:4096 Thr:8 Vec:4
Recovered........: 0/1 (0.00%) Digests
Progress.........: 3264/6634204312890625 (0.00%)
Rejected.........: 0/3264 (0.00%)
Restore.Point....: 0/69833729609375 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:17-18 Iteration:356352-360448
Candidates.#1....: farierin -> fooverin
[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>
Â
Could you please identify your current issue?
It started out as a signature failure, but that seems to have been sorted out. Aas far as I can see from your latest post, you've got everything working. What is it that you think is wrong, and what should it be instead, in your opinion?
Â
That looks to be working, you are however trying to crack on what looks like an on-board GPU. Which is why it says it will take so long to crack.Â
7zip is a very slow algo to crack, especially with mask attacks. Since you created the zip, you could try making the mask "match" your password e.g. ?u?l?l?l?d?d?s?s. Though I fear this will still take a very long time with an onboard card.
Â
Â
Â
Â