Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Brute force knowing some characters (but not their location)
Post: RE: Brute force knowing some characters (but not t...
This code generate the masks I was looking for:
Code:
--
from itertools import permutations
perms = [''.join(p) for p in permutations('9AAAAAAA')]
perms = set(perms)
with open('masks.txt'... |
|
andreap |
hashcat
|
7 |
7,638 |
02-20-2023, 06:33 PM |
|
|
Thread: Brute force knowing some characters (but not their location)
Post: RE: Brute force knowing some characters (but not t...
Snoopy Wrote: (02-20-2023, 04:43 PM)
--
as i said, this strongly depends on your hash, just take a look at a single NVIDIA GeForce RTX 3060 for md5
speed around 24645.8 MH/s, so in the case mentione... |
|
andreap |
hashcat
|
7 |
7,638 |
02-20-2023, 04:54 PM |
|
|
Thread: Brute force knowing some characters (but not their location)
Post: RE: Brute force knowing some characters (but not t...
Snoopy Wrote: (02-20-2023, 01:30 PM)
--
well depends on how much chars do you know to reduce keyspace
also depending on the hashalgorithm, for fast algorithm like md5, you could simple stick to
... |
|
andreap |
hashcat
|
7 |
7,638 |
02-20-2023, 04:13 PM |
|
|
Thread: Brute force knowing some characters (but not their location)
Post: RE: Brute force knowing some characters (but not t...
andreap Wrote: (02-20-2023, 03:00 AM)
--
-a 3 -1 '?l9' '?1?l?l?l?l?l?l?l'
-a 3 -1 '?l9' '?l?1?l?l?l?l?l?l'
-a 3 -1 '?l9' '?l?l?1?l?l?l?l?l'
-a 3 -1 '?l9' '?l?l?l?1?l?l?l?l'
-a 3 -1 '?l9' '?l?l?l?... |
|
andreap |
hashcat
|
7 |
7,638 |
02-20-2023, 05:25 AM |
|
|
Thread: Brute force knowing some characters (but not their location)
Post: Brute force knowing some characters (but not their...
Hi all,
i'm wondering if it's possible to do a brute force attack by knowing some characters of the password but not their location.
Obviously the most obvious solution is this:
-a 3 -1 '?l?d' '?... |
|
andreap |
hashcat
|
7 |
7,638 |
02-20-2023, 03:00 AM |