md5crypt brutforce for pass 13 lenght
#1
Hello

i try to brutforce md5crypt i got

Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?1?1?1?1?1?1?1

my password have 13 in lenght and have only ?l?d

the password is only in hex

and i use this commande

hashcat.exe -O -m 500 md5.hash -a 3 ?1?1?1?1?1?1?1?1?1?1?1?1?1 --increment -1 ?l?d --increment-min 13 --force -w 4 --opencl-device-types 1,2 -w 4 --force

can help for this
Reply
#2
Why not use ?h instead of ?1
Still 13 chars is going to take awhile even with multiple 3090s
Reply
#3
The integer overflow is triggered because you've requested that hashcat generate more than 2^64 combinations, which is the limit (I believe).

You've asked for 26 letters, plus 10 digits, so 36 symbols, in 13 positions which is 36^13 (approx 1.70x10^20 combinations)

2^64 ~= 1.84x10^18
36^13 ~= 1.70x10^20


On a 3090, you'll get around 32621.8 kH/s for md5crypt you'll be a Very Long Time exhausting that keyspace

(1.70x10^20 keys / 32621800 key/sec) = 5,229,071,607,930 seconds (around 165,000 years).
Reply
#4
(11-23-2021, 08:41 PM)pdo Wrote: The integer overflow is triggered because you've requested that hashcat generate more than 2^64 combinations, which is the limit (I believe).

You've asked for 26 letters, plus 10 digits, so 36 symbols, in 13 positions which is 36^13 (approx 1.70x10^20 combinations)

2^64 ~= 1.84x10^18
36^13 ~= 1.70x10^20


On a 3090, you'll get around 32621.8 kH/s for md5crypt you'll be a Very Long Time exhausting that keyspace

(1.70x10^20 keys / 32621800 key/sec) = 5,229,071,607,930 seconds (around 165,000 years).


If you can just use hex ?h, then you can get to 16^13, which means about 6 months on a 3090! Sorta doable, if you're desperate....
Reply
#5
hi

thanks for reply

yes i have test with6 rtx 3090

with commande

hashcat.exe -O -m 500 md5.hash -a 3 ?h?h?h?h?h?h?h?h?h?h?h?h?h --increment -1 ?l?d --increment-min 13 --increment-max 13 --force -w 4


i have got estimate time is 280 days
Reply