Is current Hashcat capable of recovering my password type?
#1
Shocked 
Hello

I think my password should be fairly easy to discover, basically my base password is very much like.

LogstaotcgsatstawttoifataadftT 

But I also used substitutes and I don't remember the exact arrangement as I had no clear substitute rule that I remember for repeated substitutable letters, i.e. substitute the first and last repeated letter or only the first two etc.

My substitutes likely were

a  -  @ 4 &
s  -  $
o  -  0
i   -  1

Am I correct in believing the current builds of Hashcat cant deal with this without setting up some kind of complex attacks and only hashcat-legacy can without getting complicated using a Table-Lookup Attack?


...Thanks...
Reply
#2
Which hints do you have when you want to recover this password?
Reply
#3
Yes, a table lookup attack would be the easiest way to generate your candidates.
Reply
#4
(01-11-2021, 02:09 PM)Mem5 Wrote: Which hints do you have when you want to recover this password?

Are you asking me what I think the replacement characters are and where?

(01-11-2021, 04:17 PM)undeath Wrote: Yes, a table lookup attack would be the easiest way to generate your candidates.

I been using btcrecover so far for generating the passwords, it takes a while as it only uses one tread when doing it.
Is hashcat-legacy fast at generating password lists?
Reply