05-19-2020, 04:07 PM
(This post was last modified: 05-19-2020, 04:17 PM by womble.
Edit Reason: Addendums
)
I've made your bit of python redundant, I'm afraid -- but on the upside, false positives should be a thing of the past! You'll want to use https://github.com/mpalmer/bfacs2hashcat to extract the hash data and format it for cracking, and then run the crack using a hashcat built from https://github.com/mpalmer/hashcat/tree/bfacs (at least until https://github.com/hashcat/hashcat/pull/2407 gets merged).
Happy cracking!
Aside #1: The password on that test file you screenshotted earlier was `1212`.
Aside #2: On a V100-enabled EC2 instance:
I feel the need... the need for SPEED!
Happy cracking!
Aside #1: The password on that test file you screenshotted earlier was `1212`.
Aside #2: On a V100-enabled EC2 instance:
Code:
Speed.#1.........: 15612.1 MH/s (76.58ms) @ Accel:16 Loops:1024 Thr:1024 Vec:1
I feel the need... the need for SPEED!