"reverse" hashcat
#1
Question 
This is probably not hashcat specific, but the people here know the problem domain probably the best Wink

I am looking into various ways to determine password weakness - length, categories, entropy, breach-status, etc.

One thing that I'm trying to look into is measuring "crackability".

Now if we go for a bruteforce, we can estimate the length of time to crack via the solution space for the length/categories vs the the hashrate of modern GPUs..... BUT, is there an efficient way to determine if a password will be included in a crack (e.g. rockyou+onerule) without just running hashcat to see if it's cracked?
Reply


Messages In This Thread
"reverse" hashcat - by iQ4A9xwT27LnUB - 04-20-2021, 04:36 AM
RE: "reverse" hashcat - by vagantis - 04-20-2021, 10:09 AM
RE: "reverse" hashcat - by iQ4A9xwT27LnUB - 04-20-2021, 12:08 PM
RE: "reverse" hashcat - by vagantis - 04-21-2021, 02:21 PM
RE: "reverse" hashcat - by theNosieKnows - 04-23-2021, 11:33 AM