02-12-2017, 02:33 AM
(02-11-2017, 11:54 PM)royce Wrote: If you really think that your target plaintext is 32 digits long, you will need more information about digit placement and likelihood to have any hope of cracking it.
To answer the literal part of your question: by default, mask mode used Markov to try common combinations of characters first. There is no way to "randomize" the attempts, but if you want to simply try all combinations, you can use the --markov-disable option.
But that's not really going to make this attack useful. The length of your mask is ... extremely long. 10^32 combinations is not feasible to exhaust.
I beg to differ.
You can get randomized 32 byte numbers by using /dev/urandom.
The command would be:
cat /dev/urandom | tr -cd '0-9' | fold -w32 | ./hashcat64.bin -m <hashtype number> hash.txt <other hashcat options here>
What hash type would this be for anyway? We are assuming that brute forcing a password that long is possible with hashcat. I don't have the list handy, but there is a length limitation for every hash type. Perhaps someone can link to that.
But the odds of getting the right number are WAY worse than winning the lottery. In that respect, you are correct.