06-18-2020, 12:17 PM
(06-15-2020, 08:52 AM)philsmd Wrote: just one ....
Thanks a lot, I'm now able to run the attack.
First i tried to bruteforce crack the a sample hash with a ?b?b... mask. Unfortunately it told me it'll take longer than 10 years. Same for my Truecrypt Archive.
How could i optimize, the topic in faq didn't help me?
Code:
hashcat64 -m 6233 -a 3 -w 3 --session myses --increment-min=1 -i "D:\Meins\Hash\hashcat_whirlpool_twofish-serpent.tc" ?b?b?b?b?b?b?b
Code:
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
Code:
Session..........: myses
Status...........: Bypass
Hash.Type........: TrueCrypt PBKDF2-HMAC-Whirlpool + XTS 1536 bit
Hash.Target......: D:\Meins\Hash\hashcat_whirlpool_twofish-serpent.tc
Time.Started.....: Thu Jun 18 12:12:50 2020 (5 secs)
Time.Estimated...: Next Big Bang (> 10 years)
Guess.Mask.......: ?b?b?b?b?b?b?b [7]
Guess.Queue......: 7/7 (100.00%)
Speed.#1.........: 5456 H/s (67.88ms) @ Accel:16 Loops:7 Thr:256 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/72057594037927936 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/281474976710656 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:420-427
Candidates.#1....: $HEX[73617269657269] -> $HEX[73ffcf81d8a761]
Hardware.Mon.#1..: Temp: 65c Fan: 32% Util:100% Core:1316MHz Mem:3004MHz Bus:16
Thanks again!
Regards 3di