hashcat Forum

Full Version: Slow speed in DICT+MASK
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello!

Why is the hashrate speed very slow in a hybrid attack: dictionary + mask?

My average speed with brute force and other conditions is +- 200 mh / s, 
But if i use hybrid attack: 3-10 h/s
Because such an attack is a more complicated live calculation. It is better to create a list of passwords from this combination and use it in the attack.
the speed drop from mh to h is anymway quite strange

what kind of hash? how big is your wordlist and your long is your mask?
(01-02-2023, 02:32 PM)Snoopy Wrote: [ -> ]the speed drop from mh to h is anymway quite strange

what kind of hash? how big is your wordlist and your long is your mask?

1. Hash type: 11300 (Bitcoin dat)
2. I have 5-6 dicts. For example: I have dict 4A, its means = 4char, format=?a. So, i have 4A, 5A, 5LU and etc.
3. My mask: dict.txt -1 ?s?d  ?1?1?1?1 for example

Finally: i have 4 char in dict + 4 char to brutforce = 8 char
(01-02-2023, 02:59 PM)Mighty89 Wrote: [ -> ]
(01-02-2023, 02:32 PM)Snoopy Wrote: [ -> ]the speed drop from mh to h is anymway quite strange

what kind of hash? how big is your wordlist and your long is your mask?

1. Hash type: 11300 (Bitcoin dat)
2. I have 5-6 dicts. For example: I have dict 4A, its means = 4char, format=?a. So, i have 4A, 5A, 5LU and etc.
3. My mask: dict.txt -1 ?s?d  ?1?1?1?1 for example

Finally: i have 4 char in dict + 4 char to brutforce = 8 char

It's clear from your results that you're using a CPU and for this type of hash you need multiple GPUs
(01-02-2023, 03:15 PM)marc1n Wrote: [ -> ]
(01-02-2023, 02:59 PM)Mighty89 Wrote: [ -> ]
(01-02-2023, 02:32 PM)Snoopy Wrote: [ -> ]the speed drop from mh to h is anymway quite strange

what kind of hash? how big is your wordlist and your long is your mask?

1. Hash type: 11300 (Bitcoin dat)
2. I have 5-6 dicts. For example: I have dict 4A, its means = 4char, format=?a. So, i have 4A, 5A, 5LU and etc.
3. My mask: dict.txt -1 ?s?d  ?1?1?1?1 for example

Finally: i have 4 char in dict + 4 char to brutforce = 8 char

It's clear from your results that you're using a CPU and for this type of hash you need multiple GPUs

Maybe, but i have AMD Ryzen Threadripper PRO 3955WX 16-Cores CPU, but anyway hashrate must be much bigger
Cards: 7x RTX 3080
your dict and masks are to small, please see this issue and the given answers and adapt this to your attack

https://github.com/hashcat/hashcat/issues/1950

also for slow hashes please see the wiki about more work and adding option -S

https://hashcat.net/wiki/doku.php?id=fre...full_speed