Feasible method of cracking long, randomised passwords?
#3
(07-06-2020, 12:00 PM)CracktainCrunch Wrote: Like taking already cracked passwords that were randomly generated and jumble them up or something like that?

That's what rule-based attacks do (see philsmd's post above) and those are the recommended kind of attacks for every attack where a full brute-force is infeasible (which applies to almost all attacks).


(07-06-2020, 12:00 PM)CracktainCrunch Wrote: My GPU hashes at 44KH/s when brute forcing and about 20 when using a dictionary attack which I find very odd. Shouldn't a dictionary attack be faster than brute force?

You are mixing things up in a weird way here. The amount of hashes per second vs the about of total candidates (and thus full attack ETA). Even with a (much) slower hash rate your dictionary attack will likely complete much faster than a brute-force attack of a meaningful password length. That said, philsmd has already provided some hints how you can make your dictionary attack a bit faster. However, while in many cases it's possible to get close to the mask attack hash rate, it will usually end up with a slightly slower rate.
Reply


Messages In This Thread
RE: Feasible method of cracking long, randomised passwords? - by undeath - 07-06-2020, 03:25 PM