01-30-2021, 11:01 PM
I found an error in hashcat and maskprocessor of all versions, if I run brute force in hashcat and put several hashes of the 15700 algorithm, it stops on the first line and does not iterate further, I tried to generate all possible options in maskprocessor, but it cuts the values in the output *262144*1*8** for some reason removes $ethereum$s
Why do you need so many hashes, you ask? the answer is simple in the UTC file, several characters have been changed, namely 6 pieces in known places, the goal is to make all the hash options and run them using 3 known passwords, I made the file with hashes in a different way and the size is 3GB, tell me how you can solve this problem, because on others hashcat and maskprocessor algorithms work perfectly
1 / https://hashcat.net/wiki/doku.php?id=example_hashes give -m15700 (hash) take the test hash from here - hashcat
2 / hashcat64.exe -D1 -m15700 UTC.txt -a0 password.txt
if you put the hash in line 2 and below, brute force will not find it, but will stop at the first line
Why do you need so many hashes, you ask? the answer is simple in the UTC file, several characters have been changed, namely 6 pieces in known places, the goal is to make all the hash options and run them using 3 known passwords, I made the file with hashes in a different way and the size is 3GB, tell me how you can solve this problem, because on others hashcat and maskprocessor algorithms work perfectly
1 / https://hashcat.net/wiki/doku.php?id=example_hashes give -m15700 (hash) take the test hash from here - hashcat
2 / hashcat64.exe -D1 -m15700 UTC.txt -a0 password.txt
if you put the hash in line 2 and below, brute force will not find it, but will stop at the first line