Posts: 3
Threads: 1
Joined: Dec 2013
12-15-2013, 05:18 PM
(This post was last modified: 12-15-2013, 05:40 PM by hokakee.)
Quote:8-V7DaRMXUi5
16-P1kX4fBN0s
17-n4hbXCC26W
3-YqezxnIifv
24-80RSeFp2bw
2-KAdkHCesGY
9-E1ETDZQUxw
3-yid20HqHpM
11-lqlsnCtQj5
7-7Ujei2sVtm
11-TIAjObYCd1
1-f6SCoHXooC <=> 9bbeb6902b6aadb40bd89fb295978076f5e801ea366543014543390709e106aa
It's encrypted in SHA256 without salt.
I already tried with oclhashcat, my setting said it'd take >10years
Those are the typcal password so the mask should be
2Digits(from 1to25only) then "-" and then 10char : Az09
Only the two(or one) first digits interest me. (But I think there's no way to guess them without cracking the whole thing)
Edit : In fact, I already know bruteforcing those 10char alone isn't possible, so I'm asking if there's another way since it's not salted.
Posts: 649
Threads: 18
Joined: Nov 2010
Too many variables to say.
1) Hashing is not encryption
2) You cannot recover any portion of a string, just the whole thing.
3) 10 char is totally possible, -1 ?l?u?d
Posts: 3
Threads: 1
Joined: Dec 2013
(12-15-2013, 06:27 PM)radix Wrote: Too many variables to say.
1) Hashing is not encryption
2) You cannot recover any portion of a string, just the whole thing.
3) 10 char is totally possible, -1 ?l?u?d
What do you mean by "too many variables to say"?
1) Yup hashed.
2) That was my guess
3) I used -1 ?l?u?d ?d-?1?1?1?1?1?1?1?1?1?1
I know it's possible but it'd take more than 10years for my 7870.
Posts: 649
Threads: 18
Joined: Nov 2010
Try staging the run then, if you dont have the power to do it, you dont have the power to do it. Theres no magic involved.
Posts: 3
Threads: 1
Joined: Dec 2013
12-15-2013, 07:48 PM
(This post was last modified: 12-15-2013, 07:49 PM by hokakee.)
(12-15-2013, 07:22 PM)radix Wrote: Try staging the run then, if you dont have the power to do it, you dont have the power to do it. Theres no magic involved.
Staging the run?
There's no rainbow table or anything?