12-18-2012, 05:29 AM
Hello,
I'm trying to recover a password from a NTLM hash. I've tried using some of the rules included with hashcat, but they can't crack the one I'm working on. I generated simpler test hashes about 8 characters plain text, but hashcat is choking on my objective hash. It only tries for about 3 minutes best case before exhausting all combinations using my Tesla GPU. This seems short to me. Should it take longer?
I have some knowledge about the hashed password that might help, but I'm not sure how to generate the ruleset and the best syntax for hashcat to recover it.
For example, let's say the password has the word "cookies" in it. I'm pretty sure the password is something like
!luvcooki3s, 1lovecookies, or something to that nature
What's the best way to generate a ruleset with that in mind?
I'm trying to recover a password from a NTLM hash. I've tried using some of the rules included with hashcat, but they can't crack the one I'm working on. I generated simpler test hashes about 8 characters plain text, but hashcat is choking on my objective hash. It only tries for about 3 minutes best case before exhausting all combinations using my Tesla GPU. This seems short to me. Should it take longer?
I have some knowledge about the hashed password that might help, but I'm not sure how to generate the ruleset and the best syntax for hashcat to recover it.
For example, let's say the password has the word "cookies" in it. I'm pretty sure the password is something like
!luvcooki3s, 1lovecookies, or something to that nature
What's the best way to generate a ruleset with that in mind?