Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7673

optimizing masks with Descrypt

$
0
0
I want to brute force a few descrypt hashes, I already have around 10 passwords and so far they are composed of lowercase, uppercase and digits. All passwords have 8 characters, 2 digits and the other 6 chars are random lower/uppercase.

I am looking for smart ways to cut down brute force time so perhaps it's possible to make a password mask that firstly test combinations with 2 digits?

This is my current cmdline:

Code:
hashcat64.exe   -a 3 -m 1500 --session=all --status --status-timer=60 -o "passwords.txt" --outfile-format=1 -w 3 --gpu-temp-abort=80 -1 ?l?u?d "hashes.txt" ?1?1?1?1?1?1?1?1

Viewing all articles
Browse latest Browse all 7673

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>