I have recently been experimenting with hashcat. I made some password hashes and was then trying to decrypt them with a mask attack.
From my understanding these attack generate all the probable hashes and then compares that hash to the one provided, it it matches then we cracked it.
However when I added 5 more hashes to the program the time increased around 5x. As if it now has to make 5 more time computations.
Why’s is this this way? I thought the labor intensive part is creating the hashes from the mask. Why isn’t it just comparing the hash to now two hashes instead of one.
[link] [comments]
from hacking: security in practice https://ift.tt/D0qYHgT
Comments
Post a Comment