11-23-2017, 06:37 PM
I lost my password for a veracrypt container and have a good idea what the basis for the password may be. I created a hcmask file containing my masks:
Ran the attack:
and the program paused with the following output:
I read the morework FAQ but do not understand why the attack pauses itself. when I Resume , it just pauses again.
Code:
hashcat99?l
hashcat99*?l
password98?l
hashCat97?l
hashcat99*?l
password98*?l
hashCat97*?l
Hashcat99?l
Hashcat99*?l
Password98?l
HashCat97?l
Hashcat99*?l
Password98*?l
HashCat97*?l
hashcat99?u
hashcat99*?u
password98?u
hashCat97?u
hashcat99*?u
password98*?u
hashCat97*?u
Hashcat99?u
Hashcat99*?u
Password98?u
HashCat97?u
Hashcat99*?u
Password98*?u
HashCat97*?u
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1
Ran the attack:
Code:
hashcat64 -a 3 -m 13721 -o PasswordHits.txt hash13 masks/mayo.hcmask --force
and the program paused with the following output:
Code:
hashcat (v4.0.1) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 530, 808/3235 MB allocatable, 24MCU
* Device #2: Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz, skipped.
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP
* Uses-64-Bit
Password length minimum: 0
Password length maximum: 64
Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Watchdog: Temperature retain trigger disabled.
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>
Resumed
[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>
Resumed
[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>
I read the morework FAQ but do not understand why the attack pauses itself. when I Resume , it just pauses again.