Exploiting the human factor - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Exploiting the human factor (/thread-8656.html) Pages:
1
2
|
RE: Exploiting the human factor - Pilsener - 09-22-2019 Yeah, I noticed later that 11 days was just for the first one. Bummer. I aimed at human-chosen passwords, because many people tend to use passwords that they can remember the few times they need to enter them. "Minimum 8 chars" is by many read as "exactly 8 chars". I have obviously not studied masks well enough. Can anyone suggest a mask that will accellerate (or optimize) the list I posted further up? RE: Exploiting the human factor - royce - 09-22-2019 Yes - the one I first posted. Study how custom character set works, and replace sequences like this: ?l?l?l?l?l?l?l?l ?u?l?l?l?l?l?l?l ?d?l?l?l?l?l?l?l ... with: -1 ?l?u?d ?1?l?l?l?l?l?l?l ... etc. |