Generating dictonary
#1
Hello
What is the best solution to generating a dictionary that cracks 8 characters password with only big letters (A-Z). 
I check that combination should be cracked in 15days so is possible to generate that dictionary in parts that I can run it with breaks?
#2
The best solution is to use mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack

Code:
hashcat -m 0 -a 3 hash.txt ?u?u?u?u?u?u?u?u
#3
at any time you can simply quit hashcat when running the command philsmd gave you and later resume the cracking by running "hashcat --restore"
#4
But can I resume this action after I shut down the computer?  Thx for quick answer Wink

I get error from your command:
Code:
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 1 (HCPX): Token length exception
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 2 (UPC43F2E17): Token length exception
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 3 (): Token length exception
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 4 (UPC43F2E17): Token length exception
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 5 (?\D&Ǭ...؂N?fE???b??(I?,??W??c?Ѐ?R T!y): Token length exception
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 6 (): Token length exception
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 7 (UPC43F2E17): Token length exception
Hashfile 'hccapx/UPC43F2E17.hccapx' on line 8 (): Token length exception
No hashes loaded.
#5
you need to specify the correct hash mode
#6
(07-25-2018, 07:40 PM)undeath Wrote: you need to specify the correct hash mode
I run this code
Code:
./hashcat -m 2500 -a 3 hccapx/UPC43F2E17.hccapx ?u?u?u?u?u?u?u?u

and it's working estimated time 32days :[ on 1050Ti.

Thanks all for fast help Wink
#7
Maybe it's any faster method?

I get stats like this:
Code:
Speed.Dev.#2.....:    75557 H/s (8.38ms) @ Accel:32 Loops:16 Thr:896 Vec:1

On this bechmark i saw 107.0 kH/s :/
#8
you can add -w4 but it will make your PC useless for anything that is not hashcat.
#9
Can I restore hashcat with this command?
#10
yes