![]() |
Problems with combinate (-a 1) attack mode. - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Problems with combinate (-a 1) attack mode. (/thread-10533.html) |
Problems with combinate (-a 1) attack mode. - imnotspammerfuck - 12-18-2021 Hello everyone! I have confused with hashcat speed of this attack mode. Look. I created my own script for generating passwords. Everything working fine, password successfully restored. But I have problems with speed, which magically decrease in 1000x. Depence on which side dict is. Full command: hashcat -a 1 -m 26600 -d 1 -w 4 $metamask$hash credentials.txt rules/main.dict. (and hashcat -a 1 -m 26600 -d 1 -w 4 $metamask$hash rules/main.dict credentials.txt also). So yes, I found that this mode only connect right side, not both. So I decided to mix dictionaries manually. Look at the difference in speed: null null So the questions: 1) Why this is happens? 2) Am I miss any flag that can ask hashcat to combinate "/rules/main.dict" in start and end? 3) If there is no solution to combinate in start and end of password and I forced to run hashcat two times, can I fix this difference in speed? Thank you very much for your knowledge and your time! RE: Problems with combinate (-a 1) attack mode. - imnotspammerfuck - 12-18-2021 OK the problem is more serious then I think! I can't run 2+ hashcat at once ![]() |