Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
philsmd Wrote: (11-29-2019, 09:34 AM)
--
I don't agree that "H", "K", "M" and "P" are lowercase characters.
It's probably also not the best idea to mask attack such passwords (there are some excep... |
|
Athlon64 |
hashcat
|
9 |
3,455 |
12-03-2019, 08:24 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
Thanks for your answer.
to get 1% usage I checked GPU on windows task manager
The password looks like :
Ha6gd52oKem
or
a626KemMruP |
|
Athlon64 |
hashcat
|
9 |
3,455 |
11-29-2019, 04:42 AM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
Did not work, I stopped run after 7 hours...
Session..........: hashcat
Status...........: Bypass
Hash.Type........: MD4
Hash.Target......: 9991a482c1ad810b731bcfbeae00bf5b
Time.Started.... |
|
Athlon64 |
hashcat
|
9 |
3,455 |
11-23-2019, 01:32 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
philsmd Wrote: (11-22-2019, 08:55 PM)
--
Code:
--
hashcat64.exe -m 900 -a 3 -w 3 -O -2 ?l?d hashmd4.txt ?2?2?2?2?2?2?2?2?2?2?2
--
--
Running, but GPU showing 1% usage, is it normal ? |
|
Athlon64 |
hashcat
|
9 |
3,455 |
11-22-2019, 10:47 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
Thanks for answer,
lower case +number
MD4 |
|
Athlon64 |
hashcat
|
9 |
3,455 |
11-22-2019, 08:43 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: brute force with 11 length password(MD4)
Hello,
I was trying to recover a 11 length password with brute force, MD4
I don't understant why this did not work...
hashcat64.exe -m 900 -a 3 -w 3 -O hashmd4.txt ?h?h?h?h?h?h?h?h?h?h?h --i... |
|
Athlon64 |
hashcat
|
9 |
3,455 |
11-22-2019, 01:19 PM |