07-21-2025, 11:04 AM
Hi everyone, I'm trying to crack multiple PMKID hashes using hashcat. All passwords are 10-digit mobile numbers that start with specific 3-digit prefixes, and follow a consistent pattern:
I created a prefixes.txt file with the following content:
050
051
055
070
077
010
099
Then I used this command:
This works, but it's extremely slow — only around 1,000 H/s, while I usually get ~85–95K H/s with my older GPU.
After digging the forum, I found out I should use it like this:
This method is much faster, but:
Thanks!
- The first 3 digits are one of: 050, 051, 055, 070, 077, 010, 099
- The fourth digit is between 2 and 9 (never 0 or 1)
- The remaining digits are between 0–9
I created a prefixes.txt file with the following content:
050
051
055
070
077
010
099
Then I used this command:
Code:
hashcat -a 6 -m 22000 pmkid_hash.22000 prefixes.txt --custom-charset1=23456789 ?1?d?d?d?d?d?d
After digging the forum, I found out I should use it like this:
Code:
hashcat -a 6 prefixes.txt --custom-charset1=23456789 ?1?d?d?d?d?d?d --stdout | hashcat -m 22000 pmkid_hash.22000
- I can't see the status menu (pause, resume, checkpoint, etc.)
- No ETA or total hashes are shown — only how many have hashes been tried is shown
- I know I can calculate ETA manually (56 million per hash), but having checkpoint support is important
Thanks!