05-19-2020, 08:29 PM
(05-19-2020, 04:07 PM)womble Wrote: I've made your bit of python redundant, I'm afraid -- but on the upside, false positives should be a thing of the past! You'll want to use https://github.com/mpalmer/bfacs2hashcat to extract the hash data and format it for cracking, and then run the crack using a hashcat built from https://github.com/mpalmer/hashcat/tree/bfacs (at least until https://github.com/hashcat/hashcat/pull/2407 gets merged).
Happy cracking!
Aside #1: The password on that test file you screenshotted earlier was `1212`.
Aside #2: On a V100-enabled EC2 instance:
Code:Speed.#1.........: 15612.1 MH/s (76.58ms) @ Accel:16 Loops:1024 Thr:1024 Vec:1
I feel the need... the need for SPEED!
Well, I feel irrelevant now 😭!
Thank you for the help. I'll compile it and give it a go. btw the password was 1212 for that test file, so it working as expected.