Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: How to configure a thin brute force in hashcat?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello.
There are 2 million MD5 lines (phpBB3).
It is possible to select a list of possible passwords for each hash.
I did it.
I managed:
- 2 million MD5 lines (phpBB3).
- 10 million lines of possible passwords.
If I use this command
hashcat64.exe –a 0 –m 400 [hash.txt] [pass.txt]
It will take 170 hours.
If I understood correctly. It works like this:
Takes a password from pass.txt and checks all hash from the list.
In my case, this is a waste of time and GPU power.
There was an idea. And what if I glue hash and pass. Further I will bring them in such type.

[hashes redacted]

In other words, the duda will only work with a specific bunch (string) of hash: pass.
But the problem is that I can't get hashcat to work with such strings.
Can you tell me how to do this?
Or suggest another way. How can a specific list of passwords for verification be tied to each hash?
not supported
Hashcat won't do this today.

You might be able to simulate it with John the Ripper's "single" mode, by creating an artificial shadow file, with the expected password in the username field.