I am working on cracking a list of hashes (MD5-Unix) using hashcat or jtr. I have tried several attacks that have succeeded with about half the hashes, but am struggling to figure out custom approaches to get the rest. There are a combination of dictionary, mask, brute force, and hybrid passwords. My system is pretty slow, so are there any attacks / custom rules that would help crack the rest?
[link] [comments]
from hacking: security in practice https://ift.tt/E2s1fbj
Comments
Post a Comment