Is current Hashcat capable of recovering my password type? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Is current Hashcat capable of recovering my password type? (/thread-9757.html) |
Is current Hashcat capable of recovering my password type? - kujina - 01-09-2021 Hello I think my password should be fairly easy to discover, basically my base password is very much like. LogstaotcgsatstawttoifataadftT But I also used substitutes and I don't remember the exact arrangement as I had no clear substitute rule that I remember for repeated substitutable letters, i.e. substitute the first and last repeated letter or only the first two etc. My substitutes likely were a - @ 4 & s - $ o - 0 i - 1 Am I correct in believing the current builds of Hashcat cant deal with this without setting up some kind of complex attacks and only hashcat-legacy can without getting complicated using a Table-Lookup Attack? ...Thanks... RE: Is current Hashcat capable of recovering my password type? - Mem5 - 01-11-2021 Which hints do you have when you want to recover this password? RE: Is current Hashcat capable of recovering my password type? - undeath - 01-11-2021 Yes, a table lookup attack would be the easiest way to generate your candidates. RE: Is current Hashcat capable of recovering my password type? - kujina - 01-11-2021 (01-11-2021, 02:09 PM)Mem5 Wrote: Which hints do you have when you want to recover this password? Are you asking me what I think the replacement characters are and where? (01-11-2021, 04:17 PM)undeath Wrote: Yes, a table lookup attack would be the easiest way to generate your candidates. I been using btcrecover so far for generating the passwords, it takes a while as it only uses one tread when doing it. Is hashcat-legacy fast at generating password lists? |