12-08-2011, 04:14 AM
as long as you expect the password to only consist of valid ascii characters with no specials or control characters the password should be bruteforced within some days using a recent gpu. But if you expect it to consists of full range UTF-8 characters (which is unlikely for normal passwords) you might not need the password anymore after is has been recovered
Only problem is oclhashcat-lite only supporting passwords up to 55 chars (bytes). So you will need to use some other gpu based hash cracker for this job. (which will not be as fast as hashcat)
Only problem is oclhashcat-lite only supporting passwords up to 55 chars (bytes). So you will need to use some other gpu based hash cracker for this job. (which will not be as fast as hashcat)