Solution to use very large wordlist
#1
I have a wordlist that is 31 GB.  I understand this is a very large wordlist and when I have used big wordlists in the past hashcat was very slow, but when I try to use this wordlist it give me this 


0 H/s

0/17557289470 (0.00%)

Candidates.#1....: [Copying]

Candidates.#2....: [Copying]

for around a minute until just giving up and giving me this.

Progress.........: 17557289470/17557289470 (100.00%)

Rejected.........: 17557289470/17557289470 (100.00%)

My goal is to use this wordlist with rules, combinator attacks, hybrids, and permutation attacks.

I was unable to figure out how I can properly do a combinator attack if i split up this wordlist in to 10 seperate wordlists as it would only do combinator with the words in the seperate lists.



Any help would be greatly appreciated.  Thanks Smile








For more information here is the output of hashcat64.exe -I



Platform ID #1
Vendor : NVIDIA Corporation
Name : NVIDIA CUDA
Version : OpenCL 1.2 CUDA 9.1.84

Device ID #1
Type : GPU
Vendor ID : 32
Vendor : NVIDIA Corporation
Name : GeForce GTX 1070 Ti
Version : OpenCL 1.2 CUDA
Processor(s) : 19
Clock : 1683
Memory : 2048/8192 MB allocatable
OpenCL Version : OpenCL C 1.2
Driver Version : 391.01

Device ID #2
Type : GPU
Vendor ID : 32
Vendor : NVIDIA Corporation
Name : GeForce GTX 1070 Ti
Version : OpenCL 1.2 CUDA
Processor(s) : 19
Clock : 1683
Memory : 2048/8192 MB allocatable
OpenCL Version : OpenCL C 1.2
Driver Version : 391.01
Reply
#2
What is the hash type ? -m ?

For instance -m 2500 = WPA/WPA2 has a minimum password length of 8 characters

You should also think if it is possible to replace the huge file with a more clever strategy (like small dict + rules or mask attack/hybrid attack etc). Disk I/O is always a bottleneck and should be avoided.
Reply
#3
Discussion of speed needs to know what type of hash is the target. Either:

A) your attack is malformed (can you post your syntax, omitting any real hashes?), or

b) it's a pretty fast hash and you're not supplying enough work. The most common way to supply work for a wordlist attack is to add rules with -r. Try the best64.rule to start and see if it makes a difference. If so, you can experiment with other rules that ship with hashcat, or rules available elsewhere.
Reply
#4
Hashtype is 5500

smaller wordlists work fine
Reply
#5
I was already using rules with other word lists and they worked fine. This word list doesn't work with or without rules.
Reply