Using newline character as part of mask attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Using newline character as part of mask attack (/thread-7455.html) Pages:
1
2
|
RE: Using newline character as part of mask attack - undeath - 04-25-2018 how did you create the hash? RE: Using newline character as part of mask attack - ajaxdecbe - 04-25-2018 (04-25-2018, 12:05 PM)undeath Wrote: how did you create the hash? with the md5 command on linux. Is my hashcat syntax correct? RE: Using newline character as part of mask attack - undeath - 04-25-2018 The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command? RE: Using newline character as part of mask attack - ajaxdecbe - 04-25-2018 Guys, Thanks for the quick responses. I was having a typo. The below syntax worked. hashcat64 -a 3 -m 20 -O --hex-salt hash.txt ?a?a?a -m 20 with mask was 5x faster than -m 0 with mask. That being said, are there any other method to further optimize or improve performance here? RE: Using newline character as part of mask attack - undeath - 04-25-2018 you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4 Other than that the most time you can save by running clever attacks. RE: Using newline character as part of mask attack - ajaxdecbe - 04-25-2018 (04-25-2018, 05:59 PM)undeath Wrote: you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4 What clever attacks are you referring to? RE: Using newline character as part of mask attack - undeath - 04-25-2018 targeted wordlists, targeted rules, more narrow masks, … |