How to configure a thin brute force in hashcat?
#1
Hello.
There are 2 million MD5 lines (phpBB3).
It is possible to select a list of possible passwords for each hash.
I did it.
I managed:
- 2 million MD5 lines (phpBB3).
- 10 million lines of possible passwords.
If I use this command
hashcat64.exe –a 0 –m 400 [hash.txt] [pass.txt]
It will take 170 hours.
If I understood correctly. It works like this:
Takes a password from pass.txt and checks all hash from the list.
In my case, this is a waste of time and GPU power.
There was an idea. And what if I glue hash and pass. Further I will bring them in such type.

[hashes redacted]

In other words, the duda will only work with a specific bunch (string) of hash: pass.
But the problem is that I can't get hashcat to work with such strings.
Can you tell me how to do this?
Or suggest another way. How can a specific list of passwords for verification be tied to each hash?
#2
not supported
#3
Hashcat won't do this today.

You might be able to simulate it with John the Ripper's "single" mode, by creating an artificial shadow file, with the expected password in the username field.
~