Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: newbie mask help
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I lost my password for a veracrypt container and have a good idea what the basis for the password may be.  I created a hcmask file containing my masks:
Code:
hashcat99?l
hashcat99*?l
password98?l
hashCat97?l
hashcat99*?l
password98*?l
hashCat97*?l
Hashcat99?l
Hashcat99*?l
Password98?l
HashCat97?l
Hashcat99*?l
Password98*?l
HashCat97*?l
hashcat99?u
hashcat99*?u
password98?u
hashCat97?u
hashcat99*?u
password98*?u
hashCat97*?u
Hashcat99?u
Hashcat99*?u
Password98?u
HashCat97?u
Hashcat99*?u
Password98*?u
HashCat97*?u
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99?1?1?1?1?1?1?1?1?1?1
?u?l,hashcat99*?1?1?1?1?1?1?1?1?1?1
?u?l,password98?1?1?1?1?1?1?1?1?1?1
?u?l,password98*?1?1?1?1?1?1?1?1?1?1

Ran the attack:
Code:
hashcat64 -a 3 -m 13721 -o PasswordHits.txt hash13 masks/mayo.hcmask --force

and the program paused with the following output:

Code:
hashcat (v4.0.1) starting...

OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 530, 808/3235 MB allocatable, 24MCU
* Device #2: Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz, skipped.

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP
* Uses-64-Bit

Password length minimum: 0
Password length maximum: 64

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.
Watchdog: Temperature retain trigger disabled.

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

Resumed

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

Resumed

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

I read the morework FAQ but do not understand why the attack pauses itself. when I Resume , it just pauses again.
Hitting 'Resume' when you're already running just prints 'Resumed' again, even if you are not paused.

If you press Enter, you'll see some progress information. Or you can add --status to display status every once in a while, and adjust the time period with --status-timer

Also note that when you explicitly specify an output file with -o, the output goes to the file, not to the screen.
Thanks! I guess I was being impatient and too literal. I see now it is working its way through the early easy masks. How long would you guess this will take to run?
If you hit Enter, it should give you a current estimate.