long mask issue
#10
(02-11-2017, 11:54 PM)royce Wrote: If you really think that your target plaintext is 32 digits long, you will need more information about digit placement and likelihood to have any hope of cracking it.

To answer the literal part of your question: by default, mask mode used Markov to try common combinations of characters first. There is no way to "randomize" the attempts, but if you want to simply try all combinations, you can use the --markov-disable option.

But that's not really going to make this attack useful. The length of your mask is ... extremely long. 10^32 combinations is not feasible to exhaust.

Thanks for reply, yes i know, it's extremely big, and i have ~ 30sec to crack it, i need a luck to find correct number, because it's not single number, i got new number every 30sec.
I have ~ 5pc with 6GPU which gives me 45Gh/s(1,5Gh/s*6*5)
that's why i don't need to brute-force it, i need randomize every digit over and over until i find correct hash


Messages In This Thread
long mask issue - by PePPeRmix - 02-11-2017, 08:48 PM
RE: long mask issue - by royce - 02-11-2017, 11:54 PM
RE: long mask issue - by devilsadvocate - 02-12-2017, 02:33 AM
RE: long mask issue - by royce - 02-12-2017, 05:04 AM
RE: long mask issue - by devilsadvocate - 02-12-2017, 05:44 AM
RE: long mask issue - by PePPeRmix - 02-12-2017, 09:24 PM
RE: long mask issue - by Ahmed18 - 02-12-2017, 12:09 AM
RE: long mask issue - by royce - 02-12-2017, 05:14 AM
RE: long mask issue - by royce - 02-12-2017, 06:28 AM
RE: long mask issue - by epixoip - 02-12-2017, 08:08 AM
RE: long mask issue - by royce - 02-12-2017, 09:44 PM
RE: long mask issue - by epixoip - 02-13-2017, 01:32 AM