hashcat Forum
MD5 mask for password - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: MD5 mask for password (/thread-7612.html)



MD5 mask for password - pbies - 06-27-2018

Hello All,

I am trying to run hashcat by this command:

hashcat64 -m 6211 -a 3 -w 3 --session pmd5 ..\private.tc ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h

there are 32 ?h but the command gives me this error:

Integer overflow detected in keyspace of mask: ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h

What I understand is that hashcat can't compute the number of combinations that it will have to check.

Is it possible to bypass such computation?

For a good desktop PC is it possible to go through the keyspace in a reasonable time?
Is supercomputer able to go through the keyspace in a reasonable time? (another question here)


RE: MD5 mask for password - undeath - 06-27-2018

(06-27-2018, 05:31 PM)pbies Wrote: Is it possible to bypass such computation?
you can modify the source code

(06-27-2018, 05:31 PM)pbies Wrote: For a good desktop PC is it possible to go through the keyspace in a reasonable time?
no

(06-27-2018, 05:31 PM)pbies Wrote: Is supercomputer able to go through the keyspace in a reasonable time? (another question here)
no


RE: MD5 mask for password - plaverty9 - 06-27-2018

3.4028237e+38 seems like an awful lot of combinations.


RE: MD5 mask for password - atom - 06-28-2018

It would be much easier to patch the init kernel to MD5 the password first before processing it with pbkdf2. Easy win?