02-17-2023, 06:31 PM
So here is the back story. I put some crypto mnemonic's in a 7zip file encrypted with AES256. Now of course I lost the password to it. One hard drive later and backup failure, here I am. This is the first one only, I have several in this mess.
So I have the 7zip file and I ran it through 7ztojohn to get the hash. I also ran it through with a test 7zip that I knew the password on and it guessed the test password correctly. However when I run it against the needed file it does not crack it. I also know the first 7 letters of the password, but do not know how many more are in it. Pretty sure it is 8 or less.
I have a couple of questions.
When you run a mask of -2 '?1?1?1?1?1?1?1' does it check for a password with less characters? If not how do I get it to check combinations from 1 to 7 characters?
When running this across several mining rigs, are there instructions somewhere how to do this properly?
Thanks for Play'n!
So I have the 7zip file and I ran it through 7ztojohn to get the hash. I also ran it through with a test 7zip that I knew the password on and it guessed the test password correctly. However when I run it against the needed file it does not crack it. I also know the first 7 letters of the password, but do not know how many more are in it. Pretty sure it is 8 or less.
I have a couple of questions.
When you run a mask of -2 '?1?1?1?1?1?1?1' does it check for a password with less characters? If not how do I get it to check combinations from 1 to 7 characters?
When running this across several mining rigs, are there instructions somewhere how to do this properly?
Thanks for Play'n!