Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7693

Help with optimizing dict attack

$
0
0
Hello, new to this great forum Smile

I'm trying to figure out a way to optimize an attempt to recover my Truecrypt password. Been doing this with hashcat for a year or so but no success.

* I have used a password with about 30 possible known words in combination. ex (dog, cat, 5000, frog, 12)
* Maybe there is also spaces between every word but maybe not.
* There are NO words used more than one time in the password.
* There are NO spaces in a row but maybe between the words. ("catdog12" or  "cat dog 12")
* The length of the password is between 15-30 characters.
* Since some words are long and some short it would be possible to exclude a lot of combinations.

I'm trying with "hashcat64 -a0 -m6211 badluck.tc mywordlist.txt"

I use OTFBrutusGUI to build different password lists. Up to about 50GB in size. I like the wordlist building that it does and I'm also used to that program since I used it before GPU-truecypt was possible.

Would be so great to get some advice on my project to find the password.


Thanks in advance!

Viewing all articles
Browse latest Browse all 7693

Trending Articles