12-11-2018, 11:17 PM
Hi,
I would like to run a combinator attack, but the issue is, that the left wordlist is different for each hash to crack (the right wordlist stays the same).
Now, that is not a problem as I can start individual hashcat commands, one by one, with the proper left wordlist for each. This leads to quite some performance degradation however, as hashcat initializes device kernel and memory at every invocation, which takes a bit of time (i should say 15 - 30 secs.)
Am I overcomplicating matters and is there another way? Rule based wouldn't work for the left wordlist, as the left wordlist is a combination of words itself (in fact, it's a list of candidate emails).
I should note that I am using --force, as I am testing this on a CPU. Maybe once I run this on a machine with a GPU and abandon --force, the startup lag goes away?
Thanks for your guidance.
I would like to run a combinator attack, but the issue is, that the left wordlist is different for each hash to crack (the right wordlist stays the same).
Now, that is not a problem as I can start individual hashcat commands, one by one, with the proper left wordlist for each. This leads to quite some performance degradation however, as hashcat initializes device kernel and memory at every invocation, which takes a bit of time (i should say 15 - 30 secs.)
Am I overcomplicating matters and is there another way? Rule based wouldn't work for the left wordlist, as the left wordlist is a combination of words itself (in fact, it's a list of candidate emails).
I should note that I am using --force, as I am testing this on a CPU. Maybe once I run this on a machine with a GPU and abandon --force, the startup lag goes away?
Thanks for your guidance.