No keyspace for the distributed hashcat v3.00
#4
If you don't know the password length and want to use mask attack, you can just use mask with different lengths. e.g. 4 to 7:
Code:
-a 3 ?a?a?a?a
-a 3 ?a?a?a?a?a
-a 3 ?a?a?a?a?a?a
-a 3 ?a?a?a?a?a?a?a

There are 2 features here that could help making this 4 runs into a single one:
1. using a .hcmask file (see https://hashcat.net/wiki/mask_attack#hashcat_mask_files)
2. using --increment (and --increment-min, --increment-max, in this case it would be -a 3 -i --increment-min 4 ?a?a?a?a?a?a?a)

The only problem, already mentioned above, is that --keyspace doesn't work together with these 2 features... i.e. you need to use --keyspace on a single mask, but you can just calculate the keyspace of each of them:
Code:
--keyspace -a 3 ?a?a?a?a
--keyspace -a 3 ?a?a?a?a?a
--keyspace -a 3 ?a?a?a?a?a?a
--keyspace -a 3 ?a?a?a?a?a?a?a
and distribute the load according to the keyspace values (e.g. first distribute the cracking of "4 character" passwords, then 5 character passwords, 6, 7 etc)


Messages In This Thread
RE: No keyspace for the distributed hashcat v3.00 - by philsmd - 07-12-2016, 04:20 PM