hashcat Forum
Exploiting the human factor - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Exploiting the human factor (/thread-8656.html)

Pages: 1 2


RE: Exploiting the human factor - Pilsener - 09-22-2019

Yeah, I noticed later that 11 days was just for the first one.  Bummer.
I aimed at human-chosen passwords, because many people tend to use passwords that they can remember the few times they need to enter them.
"Minimum 8 chars" is by many read as "exactly 8 chars".

I have obviously not studied masks well enough.
Can anyone suggest a mask that will accellerate (or optimize) the list I posted further up?


RE: Exploiting the human factor - royce - 09-22-2019

Yes - the one I first posted. Wink

Study how custom character set works, and replace sequences like this:

?l?l?l?l?l?l?l?l
?u?l?l?l?l?l?l?l
?d?l?l?l?l?l?l?l

... with:

-1 ?l?u?d ?1?l?l?l?l?l?l?l

... etc.