02-17-2016, 02:22 AM
PutNick has me doubting myself So I ran a quick test on a WPA hash I've previously cracked. I used --markov-disable and masks using charset or reverse-charset, i.e. plaintext is VTFTETBY so I've used a small charset
1. -1 VTFEBY ?1?1?1?1?1?1?1?1
2. -1 YBEFTV ?1?1?1?1?1?1?1?1
Both take the same duration and complete at the same progress point...
Progress.......: 1462272/1679616 (87.06%)
Maybe charset is too small for a proper test?
1. -1 VTFEBY ?1?1?1?1?1?1?1?1
2. -1 YBEFTV ?1?1?1?1?1?1?1?1
Both take the same duration and complete at the same progress point...
Progress.......: 1462272/1679616 (87.06%)
Maybe charset is too small for a proper test?