Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.
Is there an option to stop the command once the password has been found ?
Because dear me, he continues to test combinations (this is not the case in the video).
Actually I have just carried out some test and on the MD5 I go from 12 seconds to 5 seconds and in speed from 722kH / s to 1813 MH / s.
I didn't expect hashcat to provide a similar service to Crunch.
Do you think this line is correct or could it be improved?
Code:
hashcat64 -m %mode% -a 3 --potfile-disable -o output.txt "%hash%"
If your target password is likely less than the max supported by an optimized kernel, adding "-O" to your command line will be significantly faster. This max value varies from hashtype to hashtype - check the output for the "Maximum password length supported by kernel" value when you run with or without -O.
If the system is non-interactive and you can use all resources for cracking, '-w 4' will also increase speed.
Use hashcat's mask and/or incremental syntax to be as precise with hashcat as you were with crunch. For example, if you need lengths 5 through 7 inclusive of all digits, lower, upper, and special: