Recovered a 7z password with hashcat, but it's not the right one
#6
(08-29-2020, 02:07 PM)philsmd Wrote: you could try with --keep-guessing and see how many false positives you get.

Since it's a crc32 checksum it's not impossible (the decompression errors in case of compression of course would prevent a lot of "wrong results", but since it's not compressed false postives are much more likely, but still quite difficult to get very many because of the 2^19 iteration cost)

So just start the same mask attack again with --keep-guessing? Or is there a way to tell hashcat to start where it finished last time?
Reply


Messages In This Thread
RE: Recovered a 7z password with hashcat, but it's not the right one - by v01d - 08-30-2020, 07:26 PM