Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Feasible method of cracking long, randomised passwords?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
If you are certain the password is random and not derived from some word or otherwise human-chosen you will not be able to crack that rar file.

(07-07-2020, 08:24 PM)CracktainCrunch Wrote: [ -> ]I understand that anything larger than 8 characters is infeasible to use brute force on, even with a mask. So I wondered if it would help to shorten the time by generating a bunch of random passwords that are 10 to 15 characters in length containing lower, upper case letters, numbers and special signs since hashcat wouldn't have to do that on the fly, copy them into a wordlist and use that wordlist to attack the archive.

Passwords of that length are not infeasible to crack because of some hashcat limitation but because of the sheer amount of possibilities. Obviously saving those combinations into a text file and feeding them to hashcat as a wordlist will not reduce the number of possibilities. Not to mention that you will likely run out of hard drive space before you manage to save all those candidates.
Pages: 1 2