Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Mask assumptions
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
hey!

I need some help with a longer password hash. I could only assume a few thing but don't know anything specific. It's a NTLM hash from a Mac OSX 10.6 samba login and may have 10 to 16 key strokes. It's definitely a complex password, so dictionaries won't help me. Is there any chance to mask the attack to reduce the processing time by assumptions like:
I guess no key is pressed more than two times. And in addition: I guess only up to three upper score characters are used and a maximum of four numbers and two special characters. 

I hope there is a chance to limit it in that way or is there any other way to improve my attack?

Cheers,
Dogman
hmm, maybne this could help u
https://thesprawl.org/projects/pack/

maybe some one else could tell u more about the same key being pressed twice or less