04-11-2024, 02:58 PM
well plain md5 is mode m0 not m22500 (MultiBit Classic .key (MD5))
look at the used charset or guessbase? in the status window, due to the fact, that you didnt provide a mask for attacking, hashcat uses a built in standard mask and increment this mask, this is okay for fast test or anything else, but will never perform a "full" bruteforce
anyway,, if you have any clue about your old password a specialized mask attack or dictionary attack would be more suitable
look at the used charset or guessbase? in the status window, due to the fact, that you didnt provide a mask for attacking, hashcat uses a built in standard mask and increment this mask, this is okay for fast test or anything else, but will never perform a "full" bruteforce
anyway,, if you have any clue about your old password a specialized mask attack or dictionary attack would be more suitable