Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: mask attack for non-repeating chars
Post: mask attack for non-repeating chars

Hi everyone, I'm trying to crack one of my old wallet.dat passwords for a Bitcoin-fork network. The password (which was generated by Spideroak Encryptr) uses uppercase, lowercase, and all symbols, an...
escher999 hashcat 7 2,022 09-30-2019, 08:00 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

That's helpful, thanks undeath. Looking at the maskprocessor docs, it looks like I can limit the use of consecutive identical chars using the "-q" and "-r" flags, respectively. So if I want to limit...
escher999 hashcat 7 2,022 09-30-2019, 10:33 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

Ah, my mistake, that's correct. I can just use -q 1 then. I'll try this and revert if I get stuck, thanks again undeath.
escher999 hashcat 7 2,022 09-30-2019, 10:55 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

Before proceeding, I want to check if it's practical to devote any time to cracking this password. If cracking time = keyspace / hashrate keyspace = 95^12 = 5.403600877×10²³ hashrate = ha...
escher999 hashcat 7 2,022 10-01-2019, 08:08 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

You're right, should have been 0.15 divisor. Leaves me with a corrected cracking time of 1.14×10¹⁷ with 1x 1070 GPU. Oh well, thanks for your help undeath.
escher999 hashcat 7 2,022 10-01-2019, 09:53 PM