Precomputed sets of hashes
#2
yes you could do this.

just start by doing a standard mask attack against the hash. if you don't want to see what the input was, just use -o /dev/null --disable-potfile and hashcat will simply print a message saying it cracked the hash without telling you what the input was, and exit with the appropriate return code.

you could use maskprocessor to pre-compute this; however, you wouldn't want to actually do this, because for one it will likely require a massive amount of disk space, and second, on-gpu candidate generation is several orders of magnitude faster than running through a straight wordlist.


Messages In This Thread
Precomputed sets of hashes - by regnar998 - 11-19-2013, 02:57 PM
RE: Precomputed sets of hashes - by epixoip - 11-19-2013, 07:36 PM