05-13-2018, 03:54 AM
Pages: 1 2
05-13-2018, 04:00 AM
Not much to go on to help you here.
Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a hash, you're hashing many strings until a hash matches the hash you have.
Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a hash, you're hashing many strings until a hash matches the hash you have.
05-13-2018, 11:38 AM
you won't complete that brute force attack within your lifetime with a single high end gpu.
05-14-2018, 12:07 AM
(05-12-2018, 07:56 PM)h1430210 Wrote: [ -> ]For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $,
You would use
hashcat -a 3 -m<whatever it is> <hashfile> -1 ?l?u@#$ ?1?1?1?1?1?1?1?1?1?1
Thanks man ! gota put the rig to work now ! Estimated time to crack password 2 years lol
05-14-2018, 12:10 AM
(05-14-2018, 12:07 AM)cryptozin Wrote: [ -> ](05-12-2018, 07:56 PM)h1430210 Wrote: [ -> ]For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $,
You would use
hashcat -a 3 -m<whatever it is> <hashfile> -1 ?l?u@#$ ?1?1?1?1?1?1?1?1?1?1
Thanks man ! gota put the rig to work now ! Estimated time to crack password 2 years lol
Is there a way to save the cracking progress? In case of pc crash or energy down etc? So doesn`t have to start over?
05-14-2018, 12:59 AM
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.
05-14-2018, 01:25 AM
(05-14-2018, 12:59 AM)royce Wrote: [ -> ]Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.
Nice ! Thanks Royce.
Pages: 1 2