md5 bruteforce with 2 known salts
#5
(12-17-2020, 01:26 AM)undeath Wrote: You already posted the workaround in your first post: append the second salt to your mask.

It works but the problem remains the same, the performance is extremely low compared to a simple md5 bruteforce. I think the problem is in the mask attack itself :/

Code:
Speed.#1.........:  123.2 MH/s (3.98ms) @ Accel:256 Loops:1 Thr:256 Vec:1

Additionally, hashcat gives me this warning, but I don't think I need/can increase the work amount:
Code:
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.

Do you have another idea?
Reply


Messages In This Thread
md5 bruteforce with 2 known salts - by AlanGomes_ - 12-17-2020, 12:57 AM
RE: md5 bruteforce with 2 known salts - by AlanGomes_ - 12-17-2020, 01:30 AM