NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - 8track simple explanation


7 Results - Page 1 of 1 -
1
Author Message
Avatar
kevtheskin

Status: Member
Joined: Wed, 21 Feb 2018
Posts: 391
Team:
Reputation: 261 Reputation
Online
Mon, 22 Apr 2019 @ 12:36:27

Hell there,
Would someone be kind enough to explain how to do the 8track hashes please. I read freeroute tip but could not get it to work thanks.

Kev


Avatar
dipeperon

Status: Member
Joined: Tue, 03 Apr 2018
Posts: 431
Team:
Reputation: 431 Reputation
Online
Mon, 22 Apr 2019 @ 20:36:36

HASH = --SALT--PASSWORD--

Step 1. take left list from hashes.org
step 2. append and prepend "--" (no quotes ofc) to every salt
step 3. use this rule as last rule in attack mode dictionary/rules: $- $-
step 4. run as -m 120 (= SALTPASSWORD)


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff

Avatar
kevtheskin

Status: Member
Joined: Wed, 21 Feb 2018
Posts: 391
Team:
Reputation: 261 Reputation
Online
Tue, 23 Apr 2019 @ 20:48:10

dipeperon said:

HASH = --SALT--PASSWORD--

Step 1. take left list from hashes.org
step 2. append and prepend "--" (no quotes ofc) to every salt
step 3. use this rule as last rule in attack mode dictionary/rules: $- $-
step 4. run as -m 120 (= SALTPASSWORD)


Hello dipeperon, Thanks for the answer dont quite understand what you meant, Could you give me a before and after example hash please. Also where do you add the $- $-. Cheers peeps. Kev


Avatar
kevtheskin

Status: Member
Joined: Wed, 21 Feb 2018
Posts: 391
Team:
Reputation: 261 Reputation
Online
Tue, 23 Apr 2019 @ 21:55:45

dipeperon said:

HASH = --SALT--PASSWORD--

Step 1. take left list from hashes.org
step 2. append and prepend "--" (no quotes ofc) to every salt
step 3. use this rule as last rule in attack mode dictionary/rules: $- $-
step 4. run as -m 120 (= SALTPASSWORD)


Hello again, I read it again and tried it against some found hashes. I think I have got it Yee haaa. Cheers Kev


Avatar
deepkeks

Status: n/a
Joined: Wed, 06 Mar 2019
Posts: 61
Team:
Reputation: 40 Reputation
Offline
Fri, 26 Apr 2019 @ 14:51:46

kevtheskin said:

dipeperon said:

HASH = --SALT--PASSWORD--

Step 1. take left list from hashes.org
step 2. append and prepend "--" (no quotes ofc) to every salt
step 3. use this rule as last rule in attack mode dictionary/rules: $- $-
step 4. run as -m 120 (= SALTPASSWORD)


Hello again, I read it again and tried it against some found hashes. I think I have got it Yee haaa. Cheers Kev

I should note it's ALOT easier to append/prepend the salts using ULM list manager.
Add suffix '--' at the end of each line, and that makes a new list. start over with that list, and add '--' at position 42.

your hash:salt like below,
1ab869822d19c20edc76e14bd7f17583f163b8d8:007134920ddc3db871ba29a4ef3739a57f9f79be
would become
1ab869822d19c20edc76e14bd7f17583f163b8d8:--007134920ddc3db871ba29a4ef3739a57f9f79be--

however, you still need that $-$- rule. The rule is needed because the original hash was made in this form:
sha1(--salt--plain--)

so essentially, the $-$- rule adds two dashes on the right side of a cantidate. You follow so far? In the examples I give at the end, youll see two rule files, 8tracks.rule being called last to make sure that my cantidates are prepended with double hyphens. if you reverse that order, you'll get no cracks. VERY IMPORTANT.

for each cantidate, hashcat then does this:

sha1(--007134920ddc3db871ba29a4ef3739a57f9f79be--cantidate--) and sees if it matches the hash, in this case 1ab869822d19c20edc76e14bd7f17583f163b8d8.

I should note, this is in reverse order, (saltplain), but dont worry about doing that, hashcat does it automatically when you use mode 120.


please note, when you're done, if you upload your cracks to hashes.org, youll have to convert them
personally i use notepad++ for this- just open your founds, press control+h, and replace -- with nothing. as in, the replace line stays empty, no spaces.

once you replace all, youll have hash:salt:plain, and hashes can read them into the founds list

just to help, heres an example of windows command:
hashcat64.exe -w 3 -m 120 -a 0 hashes/557_8tracks-com_left_ULM_002-3.txt -r rules/analysistop10k.rule -r rules/8tracks.rule dict/8tracks-analysis-sorted.word -o 8tracks.cracked --session 8trackssessionlist1

and linux:
./hashcat -w 3 -m 120 -a 0 hashes/557_8tracks-com_left_ULM_002-3.txt -r rules/analysistop10k.rule -r rules/8tracks.rule dict/8tracks-analysis-sorted.word -o 8tracks.cracked --session 8trackssessionlist1


1 x GTX 1060 8gb
2 x GTX 1050Ti

Avatar
kevtheskin

Status: Member
Joined: Wed, 21 Feb 2018
Posts: 391
Team:
Reputation: 261 Reputation
Online
Sun, 28 Apr 2019 @ 15:53:02

deepkeks said:

kevtheskin said:

dipeperon said:

HASH = --SALT--PASSWORD--

Step 1. take left list from hashes.org
step 2. append and prepend "--" (no quotes ofc) to every salt
step 3. use this rule as last rule in attack mode dictionary/rules: $- $-
step 4. run as -m 120 (= SALTPASSWORD)


Hello again, I read it again and tried it against some found hashes. I think I have got it Yee haaa. Cheers Kev

I should note it's ALOT easier to append/prepend the salts using ULM list manager.
Add suffix '--' at the end of each line, and that makes a new list. start over with that list, and add '--' at position 42.

your hash:salt like below,
1ab869822d19c20edc76e14bd7f17583f163b8d8:007134920ddc3db871ba29a4ef3739a57f9f79be
would become
1ab869822d19c20edc76e14bd7f17583f163b8d8:--007134920ddc3db871ba29a4ef3739a57f9f79be--

however, you still need that $-$- rule. The rule is needed because the original hash was made in this form:
sha1(--salt--plain--)

so essentially, the $-$- rule adds two dashes on the right side of a cantidate. You follow so far? In the examples I give at the end, youll see two rule files, 8tracks.rule being called last to make sure that my cantidates are prepended with double hyphens. if you reverse that order, you'll get no cracks. VERY IMPORTANT.

for each cantidate, hashcat then does this:

sha1(--007134920ddc3db871ba29a4ef3739a57f9f79be--cantidate--) and sees if it matches the hash, in this case 1ab869822d19c20edc76e14bd7f17583f163b8d8.

I should note, this is in reverse order, (saltplain), but dont worry about doing that, hashcat does it automatically when you use mode 120.


please note, when you're done, if you upload your cracks to hashes.org, youll have to convert them
personally i use notepad++ for this- just open your founds, press control+h, and replace -- with nothing. as in, the replace line stays empty, no spaces.

once you replace all, youll have hash:salt:plain, and hashes can read them into the founds list

just to help, heres an example of windows command:
hashcat64.exe -w 3 -m 120 -a 0 hashes/557_8tracks-com_left_ULM_002-3.txt -r rules/analysistop10k.rule -r rules/8tracks.rule dict/8tracks-analysis-sorted.word -o 8tracks.cracked --session 8trackssessionlist1

and linux:
./hashcat -w 3 -m 120 -a 0 hashes/557_8tracks-com_left_ULM_002-3.txt -r rules/analysistop10k.rule -r rules/8tracks.rule dict/8tracks-analysis-sorted.word -o 8tracks.cracked --session 8trackssessionlist1


Thanks for the reply. Can you explain how to use the Ulm i have it my machine but not that clued up on how to use it . Kev


Avatar
deepkeks

Status: n/a
Joined: Wed, 06 Mar 2019
Posts: 61
Team:
Reputation: 40 Reputation
Offline
Sun, 28 Apr 2019 @ 16:51:52

kevtheskin said:

deepkeks said:

kevtheskin said:

dipeperon said:

HASH = --SALT--PASSWORD--

Step 1. take left list from hashes.org
step 2. append and prepend "--" (no quotes ofc) to every salt
step 3. use this rule as last rule in attack mode dictionary/rules: $- $-
step 4. run as -m 120 (= SALTPASSWORD)


Hello again, I read it again and tried it against some found hashes. I think I have got it Yee haaa. Cheers Kev

I should note it's ALOT easier to append/prepend the salts using ULM list manager.
Add suffix '--' at the end of each line, and that makes a new list. start over with that list, and add '--' at position 42.

your hash:salt like below,
1ab869822d19c20edc76e14bd7f17583f163b8d8:007134920ddc3db871ba29a4ef3739a57f9f79be
would become
1ab869822d19c20edc76e14bd7f17583f163b8d8:--007134920ddc3db871ba29a4ef3739a57f9f79be--

however, you still need that $-$- rule. The rule is needed because the original hash was made in this form:
sha1(--salt--plain--)

so essentially, the $-$- rule adds two dashes on the right side of a cantidate. You follow so far? In the examples I give at the end, youll see two rule files, 8tracks.rule being called last to make sure that my cantidates are prepended with double hyphens. if you reverse that order, you'll get no cracks. VERY IMPORTANT.

for each cantidate, hashcat then does this:

sha1(--007134920ddc3db871ba29a4ef3739a57f9f79be--cantidate--) and sees if it matches the hash, in this case 1ab869822d19c20edc76e14bd7f17583f163b8d8.

I should note, this is in reverse order, (saltplain), but dont worry about doing that, hashcat does it automatically when you use mode 120.


please note, when you're done, if you upload your cracks to hashes.org, youll have to convert them
personally i use notepad++ for this- just open your founds, press control+h, and replace -- with nothing. as in, the replace line stays empty, no spaces.

once you replace all, youll have hash:salt:plain, and hashes can read them into the founds list

just to help, heres an example of windows command:
hashcat64.exe -w 3 -m 120 -a 0 hashes/557_8tracks-com_left_ULM_002-3.txt -r rules/analysistop10k.rule -r rules/8tracks.rule dict/8tracks-analysis-sorted.word -o 8tracks.cracked --session 8trackssessionlist1

and linux:
./hashcat -w 3 -m 120 -a 0 hashes/557_8tracks-com_left_ULM_002-3.txt -r rules/analysistop10k.rule -r rules/8tracks.rule dict/8tracks-analysis-sorted.word -o 8tracks.cracked --session 8trackssessionlist1


Thanks for the reply. Can you explain how to use the Ulm i have it my machine but not that clued up on how to use it . Kev

replied via discord

I plan on putting up a walkthrough for this.


1 x GTX 1060 8gb
2 x GTX 1050Ti


7 Results - Page 1 of 1 -
1

We have a total of 216704 messages in 26499 topics.
We have a total of 23377 registered users.
Our newest registered member is knocku.