Help with optimizing dict attack
#1
Lightbulb 
Hello, new to this great forum :)

I'm trying to figure out a way to optimize an attempt to recover my Truecrypt password. Been doing this with hashcat for a year or so but no success.

* I have used a password with about 30 possible known words in combination. ex (dog, cat, 5000, frog, 12)
* Maybe there is also spaces between every word but maybe not.
* There are NO words used more than one time in the password.
* There are NO spaces in a row but maybe between the words. ("catdog12" orĀ  "cat dog 12")
* The length of the password is between 15-30 characters.
* Since some words are long and some short it would be possible to exclude a lot of combinations.

I'm trying with "hashcat64 -a0 -m6211 badluck.tc mywordlist.txt"

I use OTFBrutusGUI to build different password lists. Up to about 50GB in size. I like the wordlist building that it does and I'm also used to that program since I used it before GPU-truecypt was possible.

Would be so great to get some advice on my project to find the password.


Thanks in advance!
#2
Try with prince and use the words in the basewords with and without spaces at the end
#3
Ok, thanks for the advice. Have tried prince before, will give it a try again.
So prince should be able to have a big wordlist and run for days or weeks.
Just asking because I had some problem running it for long periods.


(10-25-2018, 07:21 AM)atom Wrote: Try with prince and use the words in the basewords with and without spaces at the end