HMAC-SHA1
#2
The beta version (https://hashcat.net/beta/) supports much larger password and salt lengths at the cost of performance (if you do not use -O command line argument with newest beta version, you should be able to use much larger salts/passwords).

Quote:it sound strange for me that it's impossible to brute a 72 char long text

it's infeasible to bruteforce a text that is truly random and 72 characters long (e.g. the mask ?b?b?b?b?b?b?b?b?b?b?b?b?b?b?b?b?b?b?b....?b?b?b, i.e. 72 times ?b).
on the other hand, if most of the 72 characters are known, you might be able to recover the text


Messages In This Thread
HMAC-SHA1 - by Paolo - 09-19-2017, 10:55 AM
RE: HMAC-SHA1 - by philsmd - 09-19-2017, 11:08 AM
RE: HMAC-SHA1 - by Paolo - 09-19-2017, 12:31 PM
RE: HMAC-SHA1 - by Paolo - 09-19-2017, 01:24 PM
RE: HMAC-SHA1 - by philsmd - 09-19-2017, 03:03 PM
RE: HMAC-SHA1 - by Paolo - 09-19-2017, 04:41 PM