Hybrid attack splitting
#2
the only ways to reduce the time needed for one chunck even further than -l 1 is to use lower -n/-u values (which affects the speed) or to reduce the number of hashes (which is also counter-productive in general if you need to test all of them)

Maybe the best answer to your question is a counterquestion: Do you really need to bruteforce bcrypt hashes? Maybe there are better alternatives than mask attack which you didn't exploit yet?


Messages In This Thread
Hybrid attack splitting - by Larrax - 09-24-2017, 01:12 PM
RE: Hybrid attack splitting - by philsmd - 09-24-2017, 02:48 PM
RE: Hybrid attack splitting - by Larrax - 09-24-2017, 03:32 PM
RE: Hybrid attack splitting - by atom - 10-01-2017, 11:29 AM
RE: Hybrid attack splitting - by Larrax - 10-01-2017, 02:38 PM