kimci86
kimci86
As a side note, I have been working some more one password recovery recently. Improvements should be coming in the next few days :crossed_fingers: such as being able to specify...
With the current version on master branch (build artifacts [available here](https://github.com/kimci86/bkcrack/suites/8179281216/artifacts/355662656)), you can use: bkcrack -k X Y Z --bruteforce ?dABCDEF --length 28
Note that exploring this search spaces of $16^{28} \approx 5.19\times10^{33}$ candidates will takes a few billion years.
This behavior was introduced by mistake in #1850 (see https://github.com/SFML/SFML/pull/1850#issuecomment-989994414). There is currently an open PR #1894 trying to solve it, without much success for now.
@swiftgeek Agreed, that would be convenient. Note that for that specific example you describe, it is already possible to decipher (without decompressing) the common file from the archive with known...
This was too old, I started over. See #100
Fix has been released in version 1.6.0
For the record, improvements to the password search algorithm are now available in version 1.6.0. - Checking a found password uses only characters from the expected character set. - Ability...
@Niko-O Thank you for sharing those measurements! It confirms adding GPU password recovery would be a great improvement.
Closing as question has been answered. Thank you for the feedback and suggestions.