Complex iTunes password
#3
(09-05-2017, 04:32 PM)undeath Wrote: The messages you are seeing are just some info, no warnings. Don't know about the ones you did not post.

If you're trying to brute-force that password you're not going to have any success. I don't know what you're trying to achieve. If you just want to know how long it would theoretically take to crack that password just do the math.

Code:
hashcat (v3.6.0) starting...

* Device #1: This hardware has outdated CUDA compute capability (3.5).
            For modern OpenCL performance, upgrade to hardware that supports
            CUDA compute capability version 5.0 (Maxwell) or higher.
* Device #1: WARNING! Kernel exec timeout is not disabled.
            This may cause "CL_OUT_OF_RESOURCES" or related errors.
            To disable the timeout, see: https://hashcat.net/q/timeoutpatch
* Device #2: This hardware has outdated CUDA compute capability (3.5).
            For modern OpenCL performance, upgrade to hardware that supports
            CUDA compute capability version 5.0 (Maxwell) or higher.
* Device #3: Not a native Intel OpenCL runtime. Expect massive speed loss.
            You can use --force to override, but do not report related errors.
nvmlDeviceGetCurrPcieLinkWidth(): Not Supported

nvmlDeviceGetClockInfo(): Not Supported

nvmlDeviceGetClockInfo(): Not Supported

nvmlDeviceGetTemperatureThreshold(): Not Supported

nvmlDeviceGetTemperatureThreshold(): Not Supported

nvmlDeviceGetUtilizationRates(): Not Supported

nvmlDeviceGetCurrPcieLinkWidth(): Not Supported

nvmlDeviceGetClockInfo(): Not Supported

nvmlDeviceGetClockInfo(): Not Supported

nvmlDeviceGetTemperatureThreshold(): Not Supported

nvmlDeviceGetTemperatureThreshold(): Not Supported

nvmlDeviceGetUtilizationRates(): Not Supported

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 780, 755/3020 MB allocatable, 12MCU
* Device #2: GeForce GTX 780, 755/3020 MB allocatable, 12MCU

OpenCL Platform #2: The pocl project
====================================
* Device #3: pthread-Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz, skipped.

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD

Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger disabled.

Cracking performance lower than expected?                

* Update your OpenCL runtime / driver the right way:
 https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:
 https://hashcat.net/faq/morework

I know that a Brute Force attack will not work.  Here is the estimate of time: 329393451 years, 242 days
What I am looking for is an attack that has a chance of recovering the password.  I.E. Wordlist, Wordlist + Rules, Masks, builtin wordlist generators........
I keep playing around with different attacks, most of which won't even start as I have the syntax wrong or I can't use Combinator with mask and so on.  If someone could just point me in the right direction for such a complex password I would really appreciate it.

Thanks for your time Smile


Messages In This Thread
Complex iTunes password - by AKFrostbyte - 09-05-2017, 03:04 PM
RE: Complex iTunes password - by undeath - 09-05-2017, 04:32 PM
RE: Complex iTunes password - by AKFrostbyte - 09-06-2017, 08:28 AM
RE: Complex iTunes password - by TofuBoy22 - 09-06-2017, 10:18 AM
RE: Complex iTunes password - by undeath - 09-06-2017, 12:03 PM
RE: Complex iTunes password - by tacohashcat - 09-06-2017, 03:21 PM
RE: Complex iTunes password - by AKFrostbyte - 09-07-2017, 07:38 AM
RE: Complex iTunes password - by philsmd - 09-07-2017, 08:25 AM