Cracking Emoji passwords in Hashcat – Digitalmunition

Home Forums Cracking Emoji passwords in Hashcat

This topic contains 0 replies, has 1 voice, and was last updated by  BrianMiz 8 months ago.

  • Author
  • #167568


    Hi, as a form of practice, I’ve been trying to crack passwords that only contain emojis.

    I’ve got an MD5 hash of the password “πŸ˜€πŸ˜€πŸ˜€πŸ˜€” and I’m using a mask attack with the command:

    `hashcat64 -m 0 -a 3 password.txt –hex-charset masks/emoji-length4.hcmask`

    The hcmask file I have so far is the following: (This works because the the `9f9880` part in the hcmask file checks the πŸ˜€ grinning face emoji.)

    f0,9f98809f98819f98829f98839f98849f98859f98869f98879f98889f98899f9890<and more…>,?1?2?2?2?1?2?2?2?1?2?2?2?1?2?2?2

    I’ve googled a lot of info about how to perform mask attacks on Unicode texts and I get that I need 2 custom char sets where the 1st will be reserved for the base code (The front byte of the character) and the 2nd would be used for the left over character code bytes. (For example, the Latin character Γ€ has a base code of c3 and the character code will be a4.)

    (Based on []( )

    I get how to use masked attack on Unicode characters when the character code is only one byte, but Emojis happen to have 3 bytes as its character code (πŸ˜€ has 9F 98 80 as its character code). How can I tweak my hcmask file so that it can, for example, go through all the smiley emoji variants? The current way I have kind of works, but takes too long considering the length of the password.

    The base code for my mask attack is f0, because I just wanted to test emojis starting from πŸ˜€ to πŸ™ and both had the same base code.

    Thanks in advance!

    PS. []( This was a helper tool I used to figure out hex bytes of Unicode characters I needed to use.

You must be logged in to reply to this topic.