(11-20-2014, 05:48 PM)coolbry95 Wrote: Yes he did. Also you approach is not very good. You do need to rethink on how you do it.
Are you using only CPU's? Are you using a mix? Have you looked at a mask attack?
Just questions you should ask yourself.
I know developed password recovery software like hashcat but we try to develop custom one. We plan to use mix (GPU and CPU). We generally plan dictionary and brute force attack.