Posts: 11
Threads: 6
Joined: Apr 2016
Does brain remember everything that has been attempted?
For example if I run a dictionary attack, and then run a bruteforce attack with rules with overlapping candidates, would those candidates be skipped?
If I ran a dictionary attack, then removed 50% of the contents of the dictionary and re-ran, would 100% be rejected?
Posts: 2,267
Threads: 16
Joined: Feb 2013
05-26-2019, 11:45 AM
(This post was last modified: 05-26-2019, 11:46 AM by philsmd.)
it depends on the --brain-client-features that was set (see hashcat --help).
brain + "--brain-client-features 3" (or "--brain-client-features 1") only makes sense with slow hashes (not something like MD5/NTLM etc, because it will slow down the attack)
Posts: 11
Threads: 6
Joined: Apr 2016
I found the above tests had an unexpected result, however with "--brain-client-features 3" it works as expected. For some reason I thought that was enabled by default. Thanks! Not sure if WPA is considered fast or slow.
Posts: 2,267
Threads: 16
Joined: Feb 2013
slow is slow, WPA is slow enough
Posts: 103
Threads: 22
Joined: Mar 2019
Do Pot file should be enable for using brain feature? would remenber the hash and the password attemped and the attack type?
Posts: 2,301
Threads: 11
Joined: Jul 2010
05-28-2019, 06:23 PM
(This post was last modified: 05-28-2019, 06:24 PM by undeath.)
you should always use the potfile, unless you are tracking cracked hashes through other means (eg outfile). hashcat brain will not do that.