09-24-2017, 03:32 PM
Thanks for the reply.
My question was rather theoretical. I'm aware that example above is not a very useful one.
Considering a distributed solution using hashcat, where the user would be able to set an approximate duration of each distributed instance of an attack - looks like the hybrid attack could be a problem here, as the minimal times of an instance (such as the one above) can be very long, regardless the user settings.
Anyway, thanks for your help!
My question was rather theoretical. I'm aware that example above is not a very useful one.
Considering a distributed solution using hashcat, where the user would be able to set an approximate duration of each distributed instance of an attack - looks like the hybrid attack could be a problem here, as the minimal times of an instance (such as the one above) can be very long, regardless the user settings.
Anyway, thanks for your help!