hashcat Forum

Full Version: Help brute forcing a SHA512 7-character password
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi all, I've been trying to brute force a SHA512 Mac OS 10.8+ password which I know the last 3 characters of but I believe there are 7 lower case characters before it. 

I've run hashcat on an Amazon EC2 P3.2xlarge (one Tesla V100), and it says it'll take 3 days to brute force it with 
?l?l?l?l?l?l?l321

The word does not appear to be in any dictionary or wordlist I've tried hence the brute force

Does anyone have any tips for getting the job done? Is my best bet to (when Amazon increases my limit) use an EC2 3.16xlarge and use pay for a spot instance for several hours?


Thanks
https://hashcat.net/forum/announcement-2.html

"Do not ask people to crack your hash. It does not matter if you are willing to pay."
(01-11-2019, 01:52 PM)DanielG Wrote: [ -> ]https://hashcat.net/forum/announcement-2.html

"Do not ask people to crack your hash. It does not matter if you are willing to pay."

Sorry I wasn't familiar with the rules as I signed up a few days ago to learn how to use Hashcat and now I'm realising hurdles associated with brute forcing a salted SHA512 without having the GPU power