well funny, tells me the same
taking a quick look, hashcat consumes around 2026 MB of RAM for this attack
jfyi, bruteforcing ethereum wallets, well dont try it, first of all i think most wallets have a minimum password length of 8?, even if not, scrypt is soooooooooooooooooooooooooo slow, without a good clue about the pass or some very specific lists for that specific user you will never be able to bruteforce a password
fast test with a dual xeon 2*12 log *2 virt = 48 threads ?a 6 times and 256 GB RAM > over 10 years
taking a quick look, hashcat consumes around 2026 MB of RAM for this attack
jfyi, bruteforcing ethereum wallets, well dont try it, first of all i think most wallets have a minimum password length of 8?, even if not, scrypt is soooooooooooooooooooooooooo slow, without a good clue about the pass or some very specific lists for that specific user you will never be able to bruteforce a password
fast test with a dual xeon 2*12 log *2 virt = 48 threads ?a 6 times and 256 GB RAM > over 10 years