Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [desc]
    Thread: mask attack for non-repeating chars
Post: mask attack for non-repeating chars

Hi everyone, I'm trying to crack one of my old wallet.dat passwords for a Bitcoin-fork network. The password (which was generated by Spideroak Encryptr) uses uppercase, lowercase, and all symbols, an...
escher999 hashcat 7 2,022 09-30-2019, 08:00 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

That's helpful, thanks undeath. Looking at the maskprocessor docs, it looks like I can limit the use of consecutive identical chars using the "-q" and "-r" flags, respectively. So if I want to limit...
escher999 hashcat 7 2,022 09-30-2019, 10:33 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

Ah, my mistake, that's correct. I can just use -q 1 then. I'll try this and revert if I get stuck, thanks again undeath.
escher999 hashcat 7 2,022 09-30-2019, 10:55 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

Before proceeding, I want to check if it's practical to devote any time to cracking this password. If cracking time = keyspace / hashrate keyspace = 95^12 = 5.403600877×10²³ hashrate = ha...
escher999 hashcat 7 2,022 10-01-2019, 08:08 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

You're right, should have been 0.15 divisor. Leaves me with a corrected cracking time of 1.14×10¹⁷ with 1x 1070 GPU. Oh well, thanks for your help undeath.
escher999 hashcat 7 2,022 10-01-2019, 09:53 PM