Help with optimizing dict attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: Help with optimizing dict attack (/thread-7889.html) |
Help with optimizing dict attack - AgntPutinoff - 10-23-2018 Hello, new to this great forum :) I'm trying to figure out a way to optimize an attempt to recover my Truecrypt password. Been doing this with hashcat for a year or so but no success. * I have used a password with about 30 possible known words in combination. ex (dog, cat, 5000, frog, 12) * Maybe there is also spaces between every word but maybe not. * There are NO words used more than one time in the password. * There are NO spaces in a row but maybe between the words. ("catdog12" orĀ "cat dog 12") * The length of the password is between 15-30 characters. * Since some words are long and some short it would be possible to exclude a lot of combinations. I'm trying with "hashcat64 -a0 -m6211 badluck.tc mywordlist.txt" I use OTFBrutusGUI to build different password lists. Up to about 50GB in size. I like the wordlist building that it does and I'm also used to that program since I used it before GPU-truecypt was possible. Would be so great to get some advice on my project to find the password. Thanks in advance! RE: Help with optimizing dict attack - atom - 10-25-2018 Try with prince and use the words in the basewords with and without spaces at the end RE: Help with optimizing dict attack - AgntPutinoff - 10-25-2018 Ok, thanks for the advice. Have tried prince before, will give it a try again. So prince should be able to have a big wordlist and run for days or weeks. Just asking because I had some problem running it for long periods. (10-25-2018, 07:21 AM)atom Wrote: Try with prince and use the words in the basewords with and without spaces at the end |