Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: How long "should" this take
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Quote:8-V7DaRMXUi5
16-P1kX4fBN0s
17-n4hbXCC26W
3-YqezxnIifv
24-80RSeFp2bw
2-KAdkHCesGY
9-E1ETDZQUxw
3-yid20HqHpM
11-lqlsnCtQj5
7-7Ujei2sVtm
11-TIAjObYCd1
1-f6SCoHXooC <=> 9bbeb6902b6aadb40bd89fb295978076f5e801ea366543014543390709e106aa
It's encrypted in SHA256 without salt.

I already tried with oclhashcat, my setting said it'd take >10years
Those are the typcal password so the mask should be
2Digits(from 1to25only) then "-" and then 10char : Az09

Only the two(or one) first digits interest me. (But I think there's no way to guess them without cracking the whole thing)

Edit : In fact, I already know bruteforcing those 10char alone isn't possible, so I'm asking if there's another way since it's not salted.
Too many variables to say.

1) Hashing is not encryption
2) You cannot recover any portion of a string, just the whole thing.
3) 10 char is totally possible, -1 ?l?u?d
(12-15-2013, 06:27 PM)radix Wrote: [ -> ]Too many variables to say.

1) Hashing is not encryption
2) You cannot recover any portion of a string, just the whole thing.
3) 10 char is totally possible, -1 ?l?u?d

What do you mean by "too many variables to say"?
1) Yup hashed.
2) That was my guess
3) I used -1 ?l?u?d ?d-?1?1?1?1?1?1?1?1?1?1
I know it's possible but it'd take more than 10years for my 7870.
Try staging the run then, if you dont have the power to do it, you dont have the power to do it. Theres no magic involved.
(12-15-2013, 07:22 PM)radix Wrote: [ -> ]Try staging the run then, if you dont have the power to do it, you dont have the power to do it. Theres no magic involved.

Staging the run?

There's no rainbow table or anything?