How to configure a thin brute force in hashcat?
#1
Hello.
There are 2 million MD5 lines (phpBB3).
It is possible to select a list of possible passwords for each hash.
I did it.
I managed:
- 2 million MD5 lines (phpBB3).
- 10 million lines of possible passwords.
If I use this command
hashcat64.exe –a 0 –m 400 [hash.txt] [pass.txt]
It will take 170 hours.
If I understood correctly. It works like this:
Takes a password from pass.txt and checks all hash from the list.
In my case, this is a waste of time and GPU power.
There was an idea. And what if I glue hash and pass. Further I will bring them in such type.

[hashes redacted]

In other words, the duda will only work with a specific bunch (string) of hash: pass.
But the problem is that I can't get hashcat to work with such strings.
Can you tell me how to do this?
Or suggest another way. How can a specific list of passwords for verification be tied to each hash?


Messages In This Thread
How to configure a thin brute force in hashcat? - by alektrick - 12-08-2018, 11:45 PM