Brute force AES-256 knowing 90% of pass?
#4
thanks for the replies, I think I might have put an extra character at the end of the password, I am also having issues getting the correct hash from the encrypted file I will be honest I only just started using hashcat what's the best way to extract the hash from an AES 256 encrypted file and then add it to hashcat,
been using the GUI version, but each time I add the hash it fails what hash type should I use etc sorry if I sound like a noob =)
Reply


Messages In This Thread
RE: Brute force AES-256 knowing 90% of pass? - by superhash - 04-15-2021, 11:58 AM