![]() |
Brute force AES-256 knowing 90% of pass? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Brute force AES-256 knowing 90% of pass? (/thread-9993.html) |
Brute force AES-256 knowing 90% of pass? - superhash - 04-06-2021 I have a file I encrypted a wile back using ssi AES 256 , I know 90% of the pas maybe 95% lol the password is something like this [5 numbers][word][word] is it possible to use hashcat fill the blanks or would it still take a billion years thanks for any help =) RE: Brute force AES-256 knowing 90% of pass? - Centurio - 04-08-2021 Hi, Did you try to use ?d?d?d?d?dword1word2 If you even know which numbers could be used (if its a date) you want to use custom chars to further limit the candidats. Good luck RE: Brute force AES-256 knowing 90% of pass? - rsberzerker - 04-09-2021 I think Centurio has pretty much given you the correct info. If you know something about the 5 digits, you could narrow things down further. For example, 5 digits could be a date. Do you have any idea what format you would have used. It could be
RE: Brute force AES-256 knowing 90% of pass? - superhash - 04-15-2021 thanks for the replies, I think I might have put an extra character at the end of the password, I am also having issues getting the correct hash from the encrypted file I will be honest I only just started using hashcat what's the best way to extract the hash from an AES 256 encrypted file and then add it to hashcat, been using the GUI version, but each time I add the hash it fails what hash type should I use etc sorry if I sound like a noob =) RE: Brute force AES-256 knowing 90% of pass? - rsberzerker - 04-15-2021 To be sure if you got the hash correct or not, you could use the example hash and see if yours looks like that one. If yes, the problem is somewhere else. If no, then it is your extraction that is the problem. |