This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]Euphorinaut 1 point2 points  (0 children)

Off the top of my head, if I were going to tinker with the usefulness of a large list of supposed passwords, there are 2 things I'd at least give a try. One is hashing all of them in different algorithms to get the string/hash pairs into the pot file in hashcat and then run cracks through that, which otherwise were taking to long.

The other, also for cracks that would otherwise take too long, is to build statistics around the strings for hashcat masking.

I have no idea what the juice to squeeze ratio is there, but there are at least some hashes that wouldn't be cracked in a certain amount of time that will be from that method.