decryption

hi is there anyone know how to decrypt the wordfile with have 8 passwords that have symbols, lowercase,uppercase and digits with a more faster way, bcos now I am using hashcat and require very long time to decrypt😭
Y
You142d ago
What?
古羊142d ago
I trying to decrypt a wordfile with brute force in hashcat but it takes too long to decrypt and if I crunch the wordlist too big
Y
You142d ago
What is a "wordfile"? Hashes, plaintext passwords or something else? (edit: you mean wordlists?) Crunch is a wordlist generator, right? And you're trying to generate a wordlist, but Crunch says it's too big? I don't know what crunch does, but if you try to generate a wordlist that tries all possible passwords under a certain length, the file is gonna be massive. Also what are you even trying to decrypt or crack?
古羊142d ago
it is a encrypted wordfile so I extract to hash and decrypt with hashcat
古羊142d ago
No description
古羊142d ago
something like this but this is decrypt another file
More Posts
HIPAA/SoftwareWas just wondering if a piece of software that is not HIPAA compliant because of an AI feature. If yis this real or scami got this email and btw the email display name is you have been h@ckedi need help with PEi am not successful and there is no solution for this on google. if anyone wants to try the machine Can someone help me with my CTF assignment IDS?I tried everything I know.hackedim just going to get top the point someone told me to download a game he made and i said sure i checscammedHi i got scammed , can someone help track the location of the personhow can i make a own vpn for safety and data not shared with any companieshow can i make a own vpn for safety and data not shared with any companies and i want to make a vpn Question about Aggressive Mode with Pre-Shared KeyA friend of mine is applying for a small business loan and they had to agree to a cybersecurity audihelloI want really learnEveryone can help me learningMy Uncertainty about Career PlanningHello friends! I was interested in the field of cyber security. I started university this year. But the questionFor every file moved to the Recycle Bin, two new files are created in the Recycle Bin. Both files cyber securty errori need help with thisPCIe to 2 NVMe m.2 Adapter on non PCIe Bifurcation MotherboardI would like to know if anyone knows of an adapter that can support 2x NVMe m.2 drives that goes intBlocked Ports Still Show up on Nmap?Btw I apologize if I sound kinda stupid, I'm not new to cyber security as a whole but I don't have mNeed helpHaving a brain fart trying to answer this question... any help would be great. Thank you What file, cyber securityHello I need help with my lab that says challenge on it I tried doing this and got errors so please Host Name resolutionI am having a project in security for host name resolution but the main problem my code is facing isi need a person that can help me on my cyber security class please pin me on dms if you are helpingme with my class thank youXSS injection questionI’m creating a very simple website that will use ChatGPTs api. I want to display the content I get fmunmap_chunk() : invalid pointer error in client server codeHello, I am doing a project on client server using socket programming in c++ using aes encryption an