Why Combinator is not making all possible combinations? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip (https://hashcat.net/forum/forum-28.html) +--- Thread: Why Combinator is not making all possible combinations? (/thread-6632.html) |
Why Combinator is not making all possible combinations? - Flx - 06-10-2017 Hi, I made three wordlists: 12345 (885 lines/words), qaz (16 lines), wsx (16 lines). First I combine qaz with wsx (result: qazwsx) Combining 12345 with qazwsx is giving me wordlist with 226560 lines (correct) Also using combinator3 combining 12345 with qaz and with wsx is giving me wordlist with 226560 lines (correct) But when I first combine 12345 with qaz (result 12345qaz (14160 lines, correct)) And then combine 12345qaz with wsx I got wordlist with only 226048 lines (512 lines missing). Can someone explain me why I'm getting two different results (they should be exactly the same) I've attached the three base wordlist. RE: Why Combinator is not making all possible combinations? - Flx - 06-11-2017 Is there any restriction in single password length? I noticed that Combiner is dropping passwords when they are longer than 36 signs. RE: Why Combinator is not making all possible combinations? - dmanyep - 10-19-2017 (06-11-2017, 05:45 PM)Flx Wrote: Is there any restriction in single password length? I noticed that Combiner is dropping passwords when they are longer than 36 signs. I searched around and couldn't find the reference, but the combinator attack will only accept words of a limited character length and I remember reading that if the output is greater than 64 characters, it wouldn't work. Could have something to do with it. I'm in the middle of setting it up myself to get it going, will reply back if I find the info again RE: Why Combinator is not making all possible combinations? - dmanyep - 10-19-2017 (06-11-2017, 05:45 PM)Flx Wrote: Is there any restriction in single password length? I noticed that Combiner is dropping passwords when they are longer than 36 signs. Found it from this page: https://hashcat.net/wiki/doku.php?id=hashcat_utils Limitations Some programs from hashcat-utils have a minimum and maximum allowed word-length range (like in “len” example). E.g. see splitlen.c: #define LEN_MIN 1 #define LEN_MAX 64 You can change them and then recompile the hashcat-utils. However we usually do not need plain words of greater length in password cracking. --------------------------------------------------------------------------------------------- So, somewhere in the code is a way to extend the length of input or output. Idk how though; sorry, i'm new RE: Why Combinator is not making all possible combinations? - dmanyep - 10-19-2017 (06-11-2017, 05:45 PM)Flx Wrote: Is there any restriction in single password length? I noticed that Combiner is dropping passwords when they are longer than 36 signs. found this also: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#why_should_i_use_a_mask_attack_i_just_want_to_brute_these_hashes What is the maximum supported password length? There's no easy or general answer. Thing is, it depends on many factors. First let's try to answer why is there such a limitation at all? The answer to this one is more simple: Because of performance! We're not talking here about a few percent. It can make a difference between 0% - 300% so we have to be very careful when we decide to support longer passwords. For example when we dropped the limitation of 16 characters in oclHashcat-plus v0.15 it had the following effect on fast-hashes:
Now what are the real maximum password lengths? This is something that we change from time to time. For each hash-type you can say the following: Whenever we find an optimization that allows us to increase the support, we will do it. Generally speaking, the new maximum length is 55 characters, but there are exceptions: [/size]
Just to make this clear: We can crack passwords up to length 55, but in case we're doing a combinator attack, the words from both dictionaries can not be longer than 31 characters. But if the word from the left dictionary has the length 24 and the word from the right dictionary is 28, it will be cracked, because together they have length 52. Also note that algorithms based on unicode, from plaintext view, only support a maximum of 27. This is because unicode uses two bytes per character, making it 27 * 2 = 54. [/size] |