Password hash cracking length

I have recently been experimenting with hashcat. I made some password hashes and was then trying to decrypt them with a mask attack.

From my understanding these attack generate all the probable hashes and then compares that hash to the one provided, it it matches then we cracked it.

However when I added 5 more hashes to the program the time increased around 5x. As if it now has to make 5 more time computations.

Why’s is this this way? I thought the labor intensive part is creating the hashes from the mask. Why isn’t it just comparing the hash to now two hashes instead of one.

submitted by /u/jorged702
[link] [comments]

from hacking: security in practice https://ift.tt/D0qYHgT

Comments