Brute force with hashcat
#1
Starting to learn hashcat and I wanted to brute force a hashed MD5 password.

I used the command

hashcat -m 0 hash -a 3 ?a?a?a?a?a?a?a ‐‐increment

Which should start at 7 characters and increment. I ran this on a cloud GPU system with four Nvidia 4090’s and it said it would take less than 5 minutes to crack. However it finished with “exhausted” and wasn’t able to crack them. I tried generating other simple password hashes to test but still no luck.

Why wasn’t brute force able to crack them despite it finishing? Shouldn’t it have gone through every possible combination if it had finished?
Reply


Messages In This Thread
Brute force with hashcat - by carollinney - 05-10-2024, 12:19 PM
RE: Brute force with hashcat - by buka - 05-10-2024, 12:22 PM
RE: Brute force with hashcat - by 174region174 - 05-12-2024, 07:29 AM
RE: Brute force with hashcat - by carollinney - 05-13-2024, 06:06 AM