Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Using newline character as part of mask attack
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
how did you create the hash?
(04-25-2018, 12:05 PM)undeath Wrote: [ -> ]how did you create the hash?

with the md5 command on linux.

Is my hashcat syntax correct?
The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command?
Guys,

Thanks for the quick responses. I was having a typo. The below syntax worked.

hashcat64 -a 3 -m 20 -O --hex-salt hash.txt ?a?a?a

-m 20 with mask was 5x faster than -m 0 with mask.

That being said, are there any other method to further optimize or improve performance here?
you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4

Other than that the most time you can save by running clever attacks.
(04-25-2018, 05:59 PM)undeath Wrote: [ -> ]you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4

Other than that the most time you can save by running clever attacks.

What clever attacks are you referring to?
targeted wordlists, targeted rules, more narrow masks, …
Pages: 1 2