32 Hash Characters
#1
hi i wanna ask is it possible to crack 32 Hash Characters like example below? 

this is only example : a70ec6f391b50a8ce7e2e07798e028f1 

because ive tried without mask and with mask but still failed. i also tried with 11 mask almost then the result is exhausted. 

Below with mask almost succeed then suddenly it exhausted:

Session..........: hashcat
Status...........: Running
Hash.Type........: MD5
Hash.Target......: Hash code
Time.Started.....: Sat May 09 00:32:32 2020 (1 hour, 5 mins)
Time.Estimated...: Sat May 09 01:40:34 2020 (2 mins, 36 secs)
Guess.Mask.......: ?l?d?d?h?l?h?l?d?d?h?l [11]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  4583.4 MH/s (8.24ms) @ Accel:256 Loops:128 Thr:256 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 18000366796800/18717736960000 (96.17%)
Rejected.........: 0/18000366796800 (0.00%)
Restore.Point....: 6922895360/7199129600 (96.16%)
Restore.Sub.#1...: Salt:0 Amplifier:2432-2560 Iteration:0-128
Candidates.#1....: f39edcn345u -> k76fa8f699q
Hardware.Mon.#1..: Temp: 74c Fan: 64% Util: 96% Core:1683MHz Mem:3504MHz Bus:16

Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: MD5
Hash.Target......: Hash code
Time.Started.....: Sat May 09 00:32:32 2020 (1 hour, 8 mins)
Time.Estimated...: Sat May 09 01:40:34 2020 (0 secs)
Guess.Mask.......: ?l?d?d?h?l?h?l?d?d?h?l [11]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  4586.1 MH/s (8.19ms) @ Accel:256 Loops:128 Thr:256 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 18717736960000/18717736960000 (100.00%)
Rejected.........: 0/18717736960000 (0.00%)
Restore.Point....: 7199129600/7199129600 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:2560-2600 Iteration:0-128
Candidates.#1....: h76ee8s64fq -> x88fq6u57fq
Hardware.Mon.#1..: Temp: 74c Fan: 64% Util: 96% Core:1683MHz Mem:3504MHz Bus:16
Reply
#2
"Exhausted" just means that for whatever keyspace you're searching, the correct password wasn't in there. Unless you're *sure* that the password is using the mask you specified, you should now move on to another mask, or perhaps use a wordlist -- I've found they're usually far more effective than brute force, in the common case.
Reply