Cracking bcrypt hash using brute force mode
#5
As a comparison:

$ hashcat --keyspace -a 3 ?a?a?a?a
857375
$ hashcat --keyspace -a 3 -1 ?l?u?d ?1?1?1?1
238328

So you're doing about 4x as much work by using ?a?a?a?a. Probably not enough of a reduction to go from "heat death of the universe" to "by lunchtime", but still worth fixing.
Reply


Messages In This Thread
RE: Cracking bcrypt hash using brute force mode - by womble - 05-10-2020, 04:20 PM