Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: mask attack for non-repeating chars
Post: mask attack for non-repeating chars
Hi everyone,
I'm trying to crack one of my old wallet.dat passwords for a Bitcoin-fork network. The password (which was generated by Spideroak Encryptr) uses uppercase, lowercase, and all symbols, an... |
|
escher999 |
hashcat
|
7 |
2,022 |
09-30-2019, 08:00 PM |
|
|
Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars
That's helpful, thanks undeath.
Looking at the maskprocessor docs, it looks like I can limit the use of consecutive identical chars using the "-q" and "-r" flags, respectively. So if I want to limit... |
|
escher999 |
hashcat
|
7 |
2,022 |
09-30-2019, 10:33 PM |
|
|
Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars
Ah, my mistake, that's correct. I can just use -q 1 then.
I'll try this and revert if I get stuck, thanks again undeath. |
|
escher999 |
hashcat
|
7 |
2,022 |
09-30-2019, 10:55 PM |
|
|
Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars
Before proceeding, I want to check if it's practical to devote any time to cracking this password.
If cracking time = keyspace / hashrate
keyspace = 95^12 = 5.403600877×10²³
hashrate = ha... |
|
escher999 |
hashcat
|
7 |
2,022 |
10-01-2019, 08:08 PM |
|
|
Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars
You're right, should have been 0.15 divisor. Leaves me with a corrected cracking time of 1.14×10¹⁷ with 1x 1070 GPU. Oh well, thanks for your help undeath. |
|
escher999 |
hashcat
|
7 |
2,022 |
10-01-2019, 09:53 PM |