Proper mask - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Proper mask (/thread-8476.html) |
Proper mask - The_Immortal - 07-10-2019 Hi there! I'm a totally newbie so I'm asking for you help... I have a md5-file with passwords "????-????-????-????", where ? is 0123456789ABCDEF. So I'm trying to bruteforce via a mask: Code: >hashcat64 -m 0 -a 3 -i --increment-min=19 --increment-max=19 work.md5 ?H?H?H?H-?H?H?H?H-?H?H?H?H-?H?H?H?H How to fix the overflow error? Or is not a feasible task even for md5? Thank you! RE: Proper mask - DanielG - 07-10-2019 if you calculate how many passwords you are trying you will see that you are getting 16 to the power 16 or 18446744073709551616 passwords (18 billion billion). On this post https://hashcat.net/forum/thread-8428.html you can see that 2x tesla v100 can do 100.1 GH/s for MD5. It would take that system 6 years to run through this space (assuming it can maintain a steady pace of 100 GH/s). What you are searching is just too big, there is no way to fix the overflow error. The only thing you can do is test smaller ranges. |