(01-27-2017, 11:53 PM)atom Wrote: This has nothing to do with the hash used, it's all just the iteration count. If you iterate MD5 a million times it would be even slower.
I'm not understanding what you mean? Since a 10 character MD5 is
781e5e245d69b566979b86e28d23f2c7 for the string 0123456789.
Where as SHA512 BB96C2FC40D2D54617D6F276FEBE571F623A8DADF0B734855299B0E107FDA32CF6B69F2DA32B36445D73690B93CBD0F7BFC20E0F7F28553D2A4428F23B716E90 is the same string. Isn't it slower at hashing because you have to generate a much longer hash?
Aside from that, I know the first 10 characters of my password. I know its 20 characters total. I believe I used 1 3 4 ! and possibly 6 in those last 10.
So I am running
Code:
hashcat64.exe -m 13721 -a 3 -w 3 -o Z:\cracked.txt -1 1346! Z:\(hash file) Disposable?1?1?1?1?1?1?1?1?1?1
Which is generating me Disposable(combinations of 1 3 4 6 !).
So 5 characters at 10 positions 5^10 is 9,765,625 different combinations.
At 249h/s (I switched to SHA512 and AES 512 since thats the Veracrypt defaults) its going to take ~11 hours which is a much more reasonable time haha.
Thanks for the help and hope I crack it.
Great program Atom mad props.