|
A question on logic and approaches to cracking - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: A question on logic and approaches to cracking (/thread-13566.html) |
A question on logic and approaches to cracking - kryptyk - 03-22-2026 Hi all, I am pretty new to hashcat, so please forgive me if I am missing the obvious. I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting. I have tried: ./hashcat -a 3 -m 1400 password.hash ./wordlists/* ?a?a?a?a?a?a?a?a <- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results. With no luck. I tried just finding out the first two characters alone: ./hashcat -a 3 -m 1400 password.hash ./wordlists/* ?a?a also no results. But got some warning about now giving hashcat enough work, however it found nothing... Maybe I am missing something obvious? Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces) in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward. Is that logic correct in your experience? Thank you. |