Inconsistency between dictionary attack and brute force attack
#3
(09-17-2024, 02:54 AM)slyexe Wrote: if that password was previously cracked, it will be stored in your hashcat.potfile which is scanned previously for any matching hashes. If that has a match it will skip the hash and proceed any other work, in this case you probably have the hash already cracked as from a previous/other post which explains you have cracked the password.

If you want to retry the attack, simply open the potfile with any text editor, delete the entry for the hash you are attempting to crack and save. Now try your attack again.

I knew it. My potfile is empty. When I tried the dictionary attack for the first time, it didn´t start, because the result was  on the potfile. So I edited the file and erase it.

After erase, the attack starts but the problem is that doesnt work and finish at exhausted.

Thanks!
Reply


Messages In This Thread
RE: Inconsistency between dictionary attack and brute force attack - by PerCT - 09-17-2024, 11:26 AM