mask processor complexity and hashcat
#4
I don't understand why people tackle problems of feasibility in such a complicated manner. You know what cracking speed your hardware can achieve against your target hash and you can calculate a rough estimate of the number of candidates you have. With those numbers it should be straight forward to determine the feasibility of cracking your target hash.

My guess is that with bcrypt and your keyspace you don't have to worry about actually attacking it after you have done that math.
Reply


Messages In This Thread
RE: mask processor complexity and hashcat - by undeath - 01-06-2021, 03:19 PM