Inconsistency between dictionary attack and brute force attack
#2
if that password was previously cracked, it will be stored in your hashcat.potfile which is scanned previously for any matching hashes. If that has a match it will skip the hash and proceed any other work, in this case you probably have the hash already cracked as from a previous/other post which explains you have cracked the password.

If you want to retry the attack, simply open the potfile with any text editor, delete the entry for the hash you are attempting to crack and save. Now try your attack again.
Reply


Messages In This Thread
RE: Inconsistency between dictionary attack and brute force attack - by slyexe - 09-17-2024, 02:54 AM