Wordpress hashes with masking - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: Wordpress hashes with masking (/thread-3012.html) |
Wordpress hashes with masking - dedi - 01-12-2014 Hello guys, I run hashcat on my: System: Ubuntu 12.04 LTS 32 bits ProcessorL AMD Phenom(tm) II X2 545 Processor × 2 RAM: 4 GB RAM What I need is to crack wordpress hashes I assume they are standard wordpress auto generated password which contains of 12 characters which are lowercaser and uppercase letters and digits, therefore I run this command on my terminal: Quote:./hashcat-cli32.bin -m 400 -a 3 --pw-min=12 --pw-max=12 -o rockyou.txt --remove hashfile.all ?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d?l?u?d The problem is time this is my console output info: Quote:Input.Mode: Mask (?l?u?d?l?u?d?l?u?d?l?u?d) [12] As you see I run hashcat almost 8 hours and nothing seems to be find up to now. Is there any way to write a rule to wordpress hashes or run this process in any way faster ? For that it is strange for me that hashacat only checks 130-150 words per second - doesn't seem to me to be ridiculous number with all the respect I assume that I made something wrong The second question is hascat session restore can I restore the session if I reboot my system and the hashcat starts searching from the point where it previously ended ? RE: Wordpress hashes with masking - radix - 01-12-2014 https://hashcat.net/wiki/doku.php?id=mask_attack |