hashcat mask
#2
first of all it's infeasible to brute-force (and in most cases also mask attack) a hash with a password that is very long and random. It's mathematically imposiible. NOT doable. just do the math (hint: it involves the total cracking speed in H/s and the total keyspace).

to answer your question:
Code:
hashcat -m 0 -a 3 --custom-charset2 ?u?d -w 3 -O hash.txt ?2?2?2?2?2?2?2?2?2?2?2
Reply


Messages In This Thread
hashcat mask - by phantom001 - 07-19-2020, 10:04 AM
RE: hashcat mask - by philsmd - 07-19-2020, 10:28 AM
RE: hashcat mask - by royce - 07-19-2020, 04:16 PM