Posts: 3
Threads: 1
Joined: Jan 2023
Hello!
Why is the hashrate speed very slow in a hybrid attack: dictionary + mask?
My average speed with brute force and other conditions is +- 200 mh / s,
But if i use hybrid attack: 3-10 h/s
Posts: 385
Threads: 1
Joined: Aug 2020
Because such an attack is a more complicated live calculation. It is better to create a list of passwords from this combination and use it in the attack.
Posts: 869
Threads: 15
Joined: Sep 2017
the speed drop from mh to h is anymway quite strange
what kind of hash? how big is your wordlist and your long is your mask?
Posts: 3
Threads: 1
Joined: Jan 2023
(01-02-2023, 02:32 PM)Snoopy Wrote: the speed drop from mh to h is anymway quite strange
what kind of hash? how big is your wordlist and your long is your mask?
1. Hash type: 11300 (Bitcoin dat)
2. I have 5-6 dicts. For example: I have dict 4A, its means = 4char, format=?a. So, i have 4A, 5A, 5LU and etc.
3. My mask: dict.txt -1 ?s?d ?1?1?1?1 for example
Finally: i have 4 char in dict + 4 char to brutforce = 8 char
Posts: 385
Threads: 1
Joined: Aug 2020
(01-02-2023, 02:59 PM)Mighty89 Wrote: (01-02-2023, 02:32 PM)Snoopy Wrote: the speed drop from mh to h is anymway quite strange
what kind of hash? how big is your wordlist and your long is your mask?
1. Hash type: 11300 (Bitcoin dat)
2. I have 5-6 dicts. For example: I have dict 4A, its means = 4char, format=?a. So, i have 4A, 5A, 5LU and etc.
3. My mask: dict.txt -1 ?s?d ?1?1?1?1 for example
Finally: i have 4 char in dict + 4 char to brutforce = 8 char
It's clear from your results that you're using a CPU and for this type of hash you need multiple GPUs
Posts: 3
Threads: 1
Joined: Jan 2023
(01-02-2023, 03:15 PM)marc1n Wrote: (01-02-2023, 02:59 PM)Mighty89 Wrote: (01-02-2023, 02:32 PM)Snoopy Wrote: the speed drop from mh to h is anymway quite strange
what kind of hash? how big is your wordlist and your long is your mask?
1. Hash type: 11300 (Bitcoin dat)
2. I have 5-6 dicts. For example: I have dict 4A, its means = 4char, format=?a. So, i have 4A, 5A, 5LU and etc.
3. My mask: dict.txt -1 ?s?d ?1?1?1?1 for example
Finally: i have 4 char in dict + 4 char to brutforce = 8 char
It's clear from your results that you're using a CPU and for this type of hash you need multiple GPUs
Maybe, but i have AMD Ryzen Threadripper PRO 3955WX 16-Cores CPU, but anyway hashrate must be much bigger
Cards: 7x RTX 3080
Posts: 869
Threads: 15
Joined: Sep 2017
your dict and masks are to small, please see this issue and the given answers and adapt this to your attack
https://github.com/hashcat/hashcat/issues/1950
also for slow hashes please see the wiki about more work and adding option -S
https://hashcat.net/wiki/doku.php?id=fre...full_speed