MD5 mask for password - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: MD5 mask for password (/thread-7612.html) |
MD5 mask for password - pbies - 06-27-2018 Hello All, I am trying to run hashcat by this command: hashcat64 -m 6211 -a 3 -w 3 --session pmd5 ..\private.tc ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h there are 32 ?h but the command gives me this error: Integer overflow detected in keyspace of mask: ?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h?h What I understand is that hashcat can't compute the number of combinations that it will have to check. Is it possible to bypass such computation? For a good desktop PC is it possible to go through the keyspace in a reasonable time? Is supercomputer able to go through the keyspace in a reasonable time? (another question here) RE: MD5 mask for password - undeath - 06-27-2018 (06-27-2018, 05:31 PM)pbies Wrote: Is it possible to bypass such computation?you can modify the source code (06-27-2018, 05:31 PM)pbies Wrote: For a good desktop PC is it possible to go through the keyspace in a reasonable time?no (06-27-2018, 05:31 PM)pbies Wrote: Is supercomputer able to go through the keyspace in a reasonable time? (another question here)no RE: MD5 mask for password - plaverty9 - 06-27-2018 3.4028237e+38 seems like an awful lot of combinations. RE: MD5 mask for password - atom - 06-28-2018 It would be much easier to patch the init kernel to MD5 the password first before processing it with pbkdf2. Easy win? |