hashcat Forum
How long to decrypt SHA256 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: How long to decrypt SHA256 (/thread-9268.html)



How long to decrypt SHA256 - FPTHHrw6mKhNZwL6 - 05-29-2020

How long to decrypt SHA256(23 character password mask attack) with 7 GPU cards?

Is there some way of calculating how long decryption would take? is there a calculator somewhere?


RE: How long to decrypt SHA256 - royce - 05-29-2020

There's no online calculator that I'm aware of.

Just do the math:

1. Calculate how many possibilities your mask will generate. For example, ?a has 95 possibilities, so ?a?a?a?a is 95^4 or 81450625. Each position's possibilities must be multiplied.

2. Run your actual attack with your actual rig (or use benchmarks for your cards and card count - but be aware that benchmarks are faster than most real-world attacks) to get your actual hashrate

3. Divide #1 by #2 to get how many seconds your attack will take.

4. Divide that by 60 to get minutes, then 60 to get hours, then 24 to get days, then 365 to get years, etc.


RE: How long to decrypt SHA256 - FPTHHrw6mKhNZwL6 - 05-29-2020

(05-29-2020, 05:50 PM)royce Wrote: There's no online calculator that I'm aware of.

Just do the math:

1. Calculate how many possibilities your mask will generate. For example, ?a has 95 possibilities, so ?a?a?a?a is 95^4 or 81450625. Each position's possibilities must be multiplied.

2. Run your actual attack with your actual rig (or use benchmarks for your cards and card count - but be aware that benchmarks are faster than most real-world attacks) to get your actual hashrate

3. Divide #1 by #2 to get how many seconds your attack will take.

4. Divide that by 60 to get minutes, then 60 to get hours, then 24 to get days, then 365 to get years, etc.

How do you know "?a" has 95 possibilities?


RE: How long to decrypt SHA256 - royce - 05-29-2020

Because of the definition of ?a, as shown in hashcat --help:

Code:
- [ Built-in Charsets ] -

  ? | Charset
===+=========
  l | abcdefghijklmnopqrstuvwxyz
  u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
  d | 0123456789
  h | 0123456789abcdef
  H | 0123456789ABCDEF
  s |  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
  a | ?l?u?d?s
  b | 0x00 - 0xff



RE: How long to decrypt SHA256 - FPTHHrw6mKhNZwL6 - 05-29-2020

(05-29-2020, 08:30 PM)royce Wrote: Because of the definition of ?a, as shown in hashcat --help:

Code:
- [ Built-in Charsets ] -

  ? | Charset
===+=========
  l | abcdefghijklmnopqrstuvwxyz
  u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
  d | 0123456789
  h | 0123456789abcdef
  H | 0123456789ABCDEF
  s |  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
  a | ?l?u?d?s
  b | 0x00 - 0xff

ok thank you


RE: How long to decrypt SHA256 - FPTHHrw6mKhNZwL6 - 05-29-2020

Another question if you don't mind...

How do you know which "hash mode" to use for SHA256?

I'm guessing it's 1410-1430?


RE: How long to decrypt SHA256 - philsmd - 05-29-2020

also note that you can't use decrypt with hashes: https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/

something that isn't encrypted, can't in general be decrypted

-m 1400 = SHA256

all the other modes that you mentioned are salted hash types, i.e. different algorithm and with additional salt information. You should know which algorithm you are dealing with, otherwise it's just a guessing game. have a look at the source code that generated the hashes