optimizing masks with Descrypt - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: optimizing masks with Descrypt (/thread-5961.html) |
optimizing masks with Descrypt - remko - 10-16-2016 I want to brute force a few descrypt hashes, I already have around 10 passwords and so far they are composed of lowercase, uppercase and digits. All passwords have 8 characters, 2 digits and the other 6 chars are random lower/uppercase. I am looking for smart ways to cut down brute force time so perhaps it's possible to make a password mask that firstly test combinations with 2 digits? This is my current cmdline: Code: hashcat64.exe -a 3 -m 1500 --session=all --status --status-timer=60 -o "passwords.txt" --outfile-format=1 -w 3 --gpu-temp-abort=80 -1 ?l?u?d "hashes.txt" ?1?1?1?1?1?1?1?1 RE: optimizing masks with Descrypt - royce - 10-16-2016 You can generate a list of masks following these restrictions, and then pass a file containing those masks to hashcat. http://thesprawl.org/projects/pack/#specifying-maximum-complexity RE: optimizing masks with Descrypt - remko - 10-16-2016 Perfect, policygen (http://thesprawl.org/projects/pack/#policygen) seems to do exactly what I need! |