hashcat does not seem to crack via mask
#2
after some experimenting with hashcat it turns out the mask processor is the only way to get a classic brute force.

i mean by classic brute force is sequential tries on the password

aaaaa
aaaab
aaaac


zzzzx
zzzzy
zzzzz

i have to pipe mp64 into hashcat witch slows a little but at least i know what the status better .

you may say "bruteforcing is so old" you are right but if you dont have one sliver of the password that is the only way.

and why hashcat did not seem to work is because the mask attacker generates random passwords so it does not hit the password as soon even though i make it easier by using password that it hits quickly


Messages In This Thread
RE: hashcat does not seem to crack via mask - by ejonesss - 05-12-2017, 10:36 PM