hashcat Forum
Is current Hashcat capable of recovering my password type? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Is current Hashcat capable of recovering my password type? (/thread-9757.html)



Is current Hashcat capable of recovering my password type? - kujina - 01-09-2021

Hello

I think my password should be fairly easy to discover, basically my base password is very much like.

LogstaotcgsatstawttoifataadftT 

But I also used substitutes and I don't remember the exact arrangement as I had no clear substitute rule that I remember for repeated substitutable letters, i.e. substitute the first and last repeated letter or only the first two etc.

My substitutes likely were

a  -  @ 4 &
s  -  $
o  -  0
i   -  1

Am I correct in believing the current builds of Hashcat cant deal with this without setting up some kind of complex attacks and only hashcat-legacy can without getting complicated using a Table-Lookup Attack?


...Thanks...


RE: Is current Hashcat capable of recovering my password type? - Mem5 - 01-11-2021

Which hints do you have when you want to recover this password?


RE: Is current Hashcat capable of recovering my password type? - undeath - 01-11-2021

Yes, a table lookup attack would be the easiest way to generate your candidates.


RE: Is current Hashcat capable of recovering my password type? - kujina - 01-11-2021

(01-11-2021, 02:09 PM)Mem5 Wrote: Which hints do you have when you want to recover this password?

Are you asking me what I think the replacement characters are and where?

(01-11-2021, 04:17 PM)undeath Wrote: Yes, a table lookup attack would be the easiest way to generate your candidates.

I been using btcrecover so far for generating the passwords, it takes a while as it only uses one tread when doing it.
Is hashcat-legacy fast at generating password lists?