Hashcat Bruteforce attack
#9
try that and see if you are lucky with PW len8 or less! You can use -i --increment-min=x to start from len x. actually the later version have Markov implemented then it would read the default hashcat.hcstat file, and build pw accordingly in this case if you don't specify any pW length it will start PW from len 5,6 up to 15 e.g. in your case xxx66; xxxx66 etc... I thought you tried and found out yourself.

However the excercise you aim for requires very powerful card. without any other information len more than 12 (xxxxxxxxxx66) would take a very very long time to complete. longer then 12x we can forget to run them this way, with markov or not.

follow the thread M@lik provides. You can use statprocessor the SP64.bin to visualise what kind of PW is generated (you won't see anything from cudaHashcat-plus64.exe); do try out the different parameters like --markov-classic; -i --increment-min; --increment-max


Messages In This Thread
Hashcat Bruteforce attack - by lucask - 12-29-2012, 07:05 PM
RE: Hashcat Bruteforce attack - by radix - 12-29-2012, 07:13 PM
RE: Hashcat Bruteforce attack - by lucask - 12-29-2012, 07:18 PM
RE: Hashcat Bruteforce attack - by K9 - 12-29-2012, 07:15 PM
RE: Hashcat Bruteforce attack - by lucask - 12-29-2012, 07:19 PM
RE: Hashcat Bruteforce attack - by ntk - 12-30-2012, 12:36 AM
RE: Hashcat Bruteforce attack - by lucask - 12-30-2012, 01:22 PM
RE: Hashcat Bruteforce attack - by M@LIK - 12-30-2012, 02:37 PM
RE: Hashcat Bruteforce attack - by ntk - 01-02-2013, 11:20 PM