hashcat Forum
Hybrid Attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Hybrid Attack (/thread-7297.html)



Hybrid Attack - Bobby123 - 02-12-2018

Hello, everybody. the problem is that the Hybrid Attack works good in right side and do not works in left  side.

So what do you think about this problem?

Thank you!

$ ... -a 6 example.dict ?d?d?d?d  ------------------------works good
generates the following password candidates:

password0000
password0001

It also works on the opposite side!

The configuration:

$ ... -a 7 ?d?d?d?d example.dict -----------------------do not works
generates the following password candidates:

0000password
0001password

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.


RE: Hybrid Attack - philsmd - 02-12-2018

This is a warning. It is not an error message.

With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration.


RE: Hybrid Attack - Bobby123 - 02-12-2018

(02-12-2018, 10:48 PM)philsmd Wrote: This is a warning. It is not an error message.

With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration.


Thanks for the answer, but the wordlist i trying is the same for -6 and for the -7 attack.


RE: Hybrid Attack - royce - 02-17-2018

Nevertheless, that's the answer. Because of how hashcat is optimized to run, undersized masks on the left-hand side have more of an impact on speed than undersized masks on the right-hand side.