hashcat Forum

Full Version: Problem with sha-256 crack
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello, I'm new with hashcat and the teacher showed it to us last week during the class. He sent us a tip to later decoding of ase-128 but the tip is coded by sha-256.

What I know about the password: length - 14, first 6 characters are numbers or big letters, another 2 are special characters and the last 6 are numbers or small or big letters. So, my command looks like: sudo ./hashcat64.bin -m1400 -a3 -1?u?d -2?s -3?l?u?d hash.txt  ?1?1?1?1?1?1?2?2?3?3?3?3?3?3 -o wynik.txt (hash.txt is a file where I have a hash and wynik.txt is a file when I want the program to write the result).

During running this command I'm getting a message: " Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?2?2?3?3?3?3?3?3. I have read a bit about this attack and couldn't find sure answer whether it's possible to crack such long password. Anyone can help?

Cheers
that's way too many possibilities
So you mean that even if such knowledge about password I'm not able to crack it in rational time?
that's a basic math problem, calculate yourself Tongue
This seems relevant to what you're dealing with: https://github.com/hashcat/hashcat/issues/1467
I have seen that. Ok, so if it is not possible to solve then I will give up with it. Maybe our teacher knew that it can't be solved. Thank you guys
I think what undeath was trying to say is "yes", it'll take a long time. Look at what it's trying to guess:

First six have a keyspace of 36 each
Next two have a keyspace of 33 each
Last six have a keyspace of 62 each

Just the first six have 1.0314425e+28 possibilities
This also seems relevant: https://hashcat.net/forum/thread-7035.html