Hi all.
I have a file with 100 SHA1 hashes and I'm trying to crack them using cudaHashcat. So far I recovered 90 plaintext passwords, using rockyou as wordlist and dive.rules as rules file. The attack mode I used is the straight one.
I'm not exactly sure how to crack these 10 missing hashes. I guess these are the "hard passwords", or at least harder than the recovered ones?
Should I try to "extract" some kind of pattern from the 90 recovered passwords? And write some custom rule based on this pattern?
Searching on the forum, I found some interesting posts like this one: https://hashcat.net/forum/thread-3933.html
However I'm not sure whether it makes sense for my usecase, as rockyou seems to be already a good enough wordlist.
Thanks in advance.
I have a file with 100 SHA1 hashes and I'm trying to crack them using cudaHashcat. So far I recovered 90 plaintext passwords, using rockyou as wordlist and dive.rules as rules file. The attack mode I used is the straight one.
I'm not exactly sure how to crack these 10 missing hashes. I guess these are the "hard passwords", or at least harder than the recovered ones?
Should I try to "extract" some kind of pattern from the 90 recovered passwords? And write some custom rule based on this pattern?
Searching on the forum, I found some interesting posts like this one: https://hashcat.net/forum/thread-3933.html
However I'm not sure whether it makes sense for my usecase, as rockyou seems to be already a good enough wordlist.
Thanks in advance.