01-02-2023, 01:45 PM
So I see that you can save sessions with hashcat, but it seems it only works with the specific attack that you are using at the moment, and that it is not possible to transfer the "non find" password ranges to another attack.
Or is it ? So what if you try different attacks, like :
Is there a way to tell hashcat to NOT try a password that was already tried in the attacks previously done ? If yes, how ?
Or is it ? So what if you try different attacks, like :
- First a dictionary attach
- Then a combinator attack
- Then a mask attack
- And then a brute force attack
Is there a way to tell hashcat to NOT try a password that was already tried in the attacks previously done ? If yes, how ?