A question on logic and approaches to cracking
#1
Hi all,
I am pretty new to hashcat, so please forgive me if I am missing the obvious.

I am working on a 64 bit hash. I have a well tuned 8 GPU rig. First of all since cracking sessions may extend for days or weeks (or until the next big-bang) devising the right approach seems key before starting.

 I have tried:

./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a?a?a?a?a?a?a <- this seems to be wrong as it is masking every-word in the list and switching it for every character available. Long run and no results.


With no luck. I tried just finding out the first two characters alone:

./hashcat -a 3  -m 1400 password.hash ./wordlists/*  ?a?a also no results.

But got some warning about now giving hashcat enough work, however it found nothing...
Maybe I am missing something obvious?

Now, I am starting from the point of view of the worse case scenario, where the hashed password is a fully random mixture of letters,digits and symbols (including blank spaces)  in no order, which would suggest that using dictionaries is useless and that that for this scenario only a full brute-force attack is the only way forward.

Is that logic correct in your experience?

Thank you.
Reply


Messages In This Thread
A question on logic and approaches to cracking - by kryptyk - 03-22-2026, 12:52 AM