Jump to content

Luzm

Active Members
  • Posts

    7
  • Joined

  • Last visited

Everything posted by Luzm

  1. Password length increment "A Mask attack is always specific to a password length. For example, if we use the mask “?l?l?l?l?l?l?l?l” we can only crack a password of the length 8. But if the password we try to crack has the length 7 we will not find it. Thats why we have to repeat the attack several times, each time with one placeholder added to the mask. This is transparently automated by using the “--increment” flag" Makes sense.
  2. I decrypted my hashes quick, cause I knew min and max, but my cousin hashes are lame lol still can not get his, I'll figure out something, read more, is there a brute force with out doing min an max, or just leave that out.
  3. Real world scenario, I asked my cousin to make me random hashes, without letting me know pwd lengths, would that help with brute forcing to decrypt? That's why I did the 6-12 min and max but then again I don't know lengths, or it's the wrong format to brute force. Cause no one really knows the length of pwd hash in a real world scenario.
  4. No, hashes range from 7 - 11 length.
  5. What am I doing wrong, I made hashes at md5.cz I identified hashes, and RTM lol, unless options or the way I wrote it are wrong or misunderstood hashcat --help manual
  6. Thanks guys for info I'll check it out more
  7. I got a question, I'm trying to find more info on oclhashcat on drivers I read that it's only available for nvidia, but I'm also trying to find drivers for or if anyone knows away around for intel corporation mobile gm965/gl960.
×
×
  • Create New...