hashcat does not seem to crack via mask
#3
Yet another thread where you go off the deep end and have no clue what you're talking about.

Mask attack in hashcat is not random, it's quite the opposite. It uses probabilistic Markov ordering to ensure that the most likely passwords are cracked first. You can disable Markov and use classic brute force by using --markov-disable, there's no need to use maskprocessor.

There are lots of other approaches one can use when they have no knowledge of the plaintext. Brute force is probably the least intelligent approach.


Messages In This Thread
RE: hashcat does not seem to crack via mask - by epixoip - 05-12-2017, 11:53 PM