Cracking bcrypt hash using brute force mode - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Cracking bcrypt hash using brute force mode (/thread-9213.html) |
Cracking bcrypt hash using brute force mode - Justonthis - 05-10-2020 Hello I'm very new to this I'm trying to crack a 4 letter password (bcrypt hash) with the possibility of containing noncapital, capital letters and numbers example: FvL6, wm4n This is the cmd I ran hashcat64.exe -m 3200 -a 3 -w 2 --custom-charset1=?l?u?d -i --increment-min 4 --increment-max 4 Ha123.txt ?a?a?a?a -o Cracked.txt But estimated time was not practical. It was wondering if I'm doing something wrong. Thank you for helping me and hopefully, my post isn't breaking any rules. RE: Cracking bcrypt hash using brute force mode - Chick3nman - 05-10-2020 You are doing it correctly, bcrypt is just designed to be that slow on purpose. There really isn't much else you can do. It might be easier to load your GPU to 100% util if you just generate all the candidates with mask processor and put them in a file, but it's possible that this doesnt help at all and its the same speed.. RE: Cracking bcrypt hash using brute force mode - philsmd - 05-10-2020 The command makes no sense. Defining any custom charset like --custom-charset1 (or short -1) without using it within the mask doesn't make any sense and is actually quite a common user mistake. It would make more sense to use -1 ?l?u?d and then a mask with ?1?1?1?1 BTW: I always try to mention the problems if I find some within user commands, otherwise other users just go ahead and blindly copy-paste (parts of) commands RE: Cracking bcrypt hash using brute force mode - Mem5 - 05-10-2020 I'll add that ?a contains symbols, which you don"t want according to your passwords ("FvL6, wm4n") RE: Cracking bcrypt hash using brute force mode - womble - 05-10-2020 As a comparison: $ hashcat --keyspace -a 3 ?a?a?a?a 857375 $ hashcat --keyspace -a 3 -1 ?l?u?d ?1?1?1?1 238328 So you're doing about 4x as much work by using ?a?a?a?a. Probably not enough of a reduction to go from "heat death of the universe" to "by lunchtime", but still worth fixing. RE: Cracking bcrypt hash using brute force mode - Justonthis - 05-11-2020 (05-10-2020, 07:29 AM)philsmd Wrote: The command makes no sense.Thanks a bunch, I have fixed that and it reduced the time considerably. I was also wondering if you can make a rule to include only a single number for each word or no number at all. I hope that's possible and isn't so much to ask. Thank you so much for taking the time to help me. RE: Cracking bcrypt hash using brute force mode - undeath - 05-11-2020 Pure masks don't support this but you can create a hcmask file with policygen from PACK: https://github.com/iphelix/PACK RE: Cracking bcrypt hash using brute force mode - Justonthis - 05-11-2020 (05-11-2020, 01:04 AM)undeath Wrote: Pure masks don't support this but you can create a hcmask file with policygen from PACK: https://github.com/iphelix/PACKCan I use pack to create a wordlist that fits my potential word candidates? then I use it later for wordlist attack and what's the command line for it please? I got to work only by typing "python3" and not "python" is that okay? My rules are --minlength 4 --maxlength 4 Capital letters and non capital letters One number max each word or no numbers at all |