Hybrid attack splitting
#1
I have noticed the hashcat keyspace in both hybrid attacks (-a 6 and -a 7) is determined by the number of passwords in dictionary. That means, when I want to split the attack into more instances, my --limit and --skip arguments affect these dictionary passwords.

However, the mask can be quite long and the instance for a single password + mask can take hours, days or more to finish. For example, this instance with 1 dictionary password would take 3+ days for me:

Code:
hashcat64.exe -m 3200 -a 7 test.hash ?l?l?l?l?l smallDict.txt --limit 1

Is there a possibility to split this job into more instances, that would each take less time? Maybe by affecting the start/stop-indexes of the mask?

Looking forward to your answer!


Messages In This Thread
Hybrid attack splitting - by Larrax - 09-24-2017, 01:12 PM
RE: Hybrid attack splitting - by philsmd - 09-24-2017, 02:48 PM
RE: Hybrid attack splitting - by Larrax - 09-24-2017, 03:32 PM
RE: Hybrid attack splitting - by atom - 10-01-2017, 11:29 AM
RE: Hybrid attack splitting - by Larrax - 10-01-2017, 02:38 PM