I'm having a problem where wordlist attacks work just how you'd expect, but brute-force / mask attacks never recover any passwords. For example when I run this command:
hashcat will finish within a second not having recovered any hashes. The specified hash is the MD5 result of "thistest".
I'm confused by this because it should've recovered my hash, but it didn't. Also the processing rate of 700GH/s sounds absurd. I'm running macOS 10.11.4 and hashcat 3.10.
Any ideas?
Code:
hashcat -a 3 3c68f35450c4b594072841cfc1c5785f ?l?l?l?l?l?l?l?l
hashcat will finish within a second not having recovered any hashes. The specified hash is the MD5 result of "thistest".
Code:
Session.Name...: hashcat
Status.........: Exhausted
Input.Mode.....: Mask (?l?l?l?l?l?l?l?l) [8]
Hash.Target....: 3c68f35450c4b594072841cfc1c5785f
Hash.Type......: MD5
Time.Started...: 0 secs
Speed.Dev.#2...: 700.6 GH/s (0.05ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 208827064576/208827064576 (100.00%)
Rejected.......: 0/208827064576 (0.00%)
I'm confused by this because it should've recovered my hash, but it didn't. Also the processing rate of 700GH/s sounds absurd. I'm running macOS 10.11.4 and hashcat 3.10.
Any ideas?