Help with optimizing dict attack
#1
Lightbulb 
Hello, new to this great forum :)

I'm trying to figure out a way to optimize an attempt to recover my Truecrypt password. Been doing this with hashcat for a year or so but no success.

* I have used a password with about 30 possible known words in combination. ex (dog, cat, 5000, frog, 12)
* Maybe there is also spaces between every word but maybe not.
* There are NO words used more than one time in the password.
* There are NO spaces in a row but maybe between the words. ("catdog12" orĀ  "cat dog 12")
* The length of the password is between 15-30 characters.
* Since some words are long and some short it would be possible to exclude a lot of combinations.

I'm trying with "hashcat64 -a0 -m6211 badluck.tc mywordlist.txt"

I use OTFBrutusGUI to build different password lists. Up to about 50GB in size. I like the wordlist building that it does and I'm also used to that program since I used it before GPU-truecypt was possible.

Would be so great to get some advice on my project to find the password.


Thanks in advance!


Messages In This Thread
Help with optimizing dict attack - by AgntPutinoff - 10-23-2018, 04:46 PM
RE: Help with optimizing dict attack - by atom - 10-25-2018, 07:21 AM