02-19-2020, 09:29 AM
Friends, Hello everyone. I am interested in the mask that is used for bruteforce, please tell me why Hashcat in bruteforce substitutes the mask:
if I don't specify it in my request:
according to this mask, total combinations: 5533380698112
if you calculate the power of the alphabet:
?l?d?u = 62
?l?d = 36^6
?l?d*!$@_ = 41^2
62*36^6*41^2 = 5533380698112
But the question is, why is this mask, if you take the power of the alphabet, consisting of capital and small English letters, numbers and 33 characters, you will get: 26+26+10+33 = 95 the power of the alphabet and raise to a power depending on the length of the password, in my case 8, total 95^8 = 6 634 204 312 890 625 combinations.
Code:
Guess.Mask.......: ?1?2?2?2?2?2?2?3 [8]
Guess.Charset....: -1 ?l?d?u, -2 ?l?d, -3 ?l?d*!$@_, -4 Undefined
if I don't specify it in my request:
Code:
C:\Hashcat\hashcat64.exe -m 2500 -a 3 -w 4 C:\hccapx\test.hccapx
according to this mask, total combinations: 5533380698112
if you calculate the power of the alphabet:
?l?d?u = 62
?l?d = 36^6
?l?d*!$@_ = 41^2
62*36^6*41^2 = 5533380698112
But the question is, why is this mask, if you take the power of the alphabet, consisting of capital and small English letters, numbers and 33 characters, you will get: 26+26+10+33 = 95 the power of the alphabet and raise to a power depending on the length of the password, in my case 8, total 95^8 = 6 634 204 312 890 625 combinations.