04-20-2021, 04:36 AM

This is probably not hashcat specific, but the people here know the problem domain probably the best

I am looking into various ways to determine password weakness - length, categories, entropy, breach-status, etc.

One thing that I'm trying to look into is measuring "crackability".

Now if we go for a bruteforce, we can estimate the length of time to crack via the solution space for the length/categories vs the the hashrate of modern GPUs..... BUT, is there an efficient way to determine if a password will be included in a crack (e.g. rockyou+onerule) without just running hashcat to see if it's cracked?

I am looking into various ways to determine password weakness - length, categories, entropy, breach-status, etc.

One thing that I'm trying to look into is measuring "crackability".

Now if we go for a bruteforce, we can estimate the length of time to crack via the solution space for the length/categories vs the the hashrate of modern GPUs..... BUT, is there an efficient way to determine if a password will be included in a crack (e.g. rockyou+onerule) without just running hashcat to see if it's cracked?