12-17-2020, 01:30 AM
(This post was last modified: 12-17-2020, 01:32 AM by AlanGomes_.)
(12-17-2020, 01:26 AM)undeath Wrote: You already posted the workaround in your first post: append the second salt to your mask.
It works but the problem remains the same, the performance is extremely low compared to a simple md5 bruteforce. I think the problem is in the mask attack itself :/
Code:
Speed.#1.........: 123.2 MH/s (3.98ms) @ Accel:256 Loops:1 Thr:256 Vec:1
Additionally, hashcat gives me this warning, but I don't think I need/can increase the work amount:
Code:
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
Do you have another idea?