New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Brute forse exosted on 3-simbol password from pkzip2 Zip file with a picture #3957
Comments
I would be very grateful for any help or explanation what i did wrong. |
Greetings. hashcat/src/modules/module_17210.c Line 112 in fafb277
|
@cxx-coder |
Hi everyone!
I have an issue. I am trying to crack MY .zip file with picture inside with brute force. I obtained hash with zip2john but this humongous hash can't be identified end can't be cracked by hashcat(I edit hash to$pkzip2$ .......$/pkzip2$) But if I put instead of picture simple txt file all works. Zip file have same 3-simbol password. (qw1)
1.txt
pic.zip
txt.zip
pic.txt
txt.txt
Expected behavior:
Identify hash from zip2john (regardless of content in zip file) and crack with brute force (or at list start)
My software is:
OS: Windows10 Home
Version: 22H2
Heshcat: 6.2.6
GPU: 551.61
MY hardware is:
Ryzen 9 5900x
Nvidia RTX3070
Nvidia Quadro M2000
Nvidia Quadro M2000
The text was updated successfully, but these errors were encountered: