06-11-2018, 06:54 PM
Hello, I'm new with hashcat and the teacher showed it to us last week during the class. He sent us a tip to later decoding of ase-128 but the tip is coded by sha-256.
What I know about the password: length - 14, first 6 characters are numbers or big letters, another 2 are special characters and the last 6 are numbers or small or big letters. So, my command looks like: sudo ./hashcat64.bin -m1400 -a3 -1?u?d -2?s -3?l?u?d hash.txt ?1?1?1?1?1?1?2?2?3?3?3?3?3?3 -o wynik.txt (hash.txt is a file where I have a hash and wynik.txt is a file when I want the program to write the result).
During running this command I'm getting a message: " Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?2?2?3?3?3?3?3?3. I have read a bit about this attack and couldn't find sure answer whether it's possible to crack such long password. Anyone can help?
Cheers
What I know about the password: length - 14, first 6 characters are numbers or big letters, another 2 are special characters and the last 6 are numbers or small or big letters. So, my command looks like: sudo ./hashcat64.bin -m1400 -a3 -1?u?d -2?s -3?l?u?d hash.txt ?1?1?1?1?1?1?2?2?3?3?3?3?3?3 -o wynik.txt (hash.txt is a file where I have a hash and wynik.txt is a file when I want the program to write the result).
During running this command I'm getting a message: " Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?2?2?3?3?3?3?3?3. I have read a bit about this attack and couldn't find sure answer whether it's possible to crack such long password. Anyone can help?
Cheers