The employed encryption scheme majorly impacts the duration of any password cracking task. For instance, running Hashcat mask attack over 8 characters long ASCII password would take in the worst case (i.e., testing all combinations of characters):
|MS Office 2003||4 696 MH/s||16d 8h 23m|
|MS Office 2007||2.192 MH/s||95y 343d 8h 47m|
|MS Office 2010||1.097 MH/s||191y 273d 20h 30m|
|MS Office 2013||0.174 kH/s||1206y 342d 6h 7m|
These numbers take into account our dedicated Tansy2 platform equipped with 8 high-end nVidia GeForce 2080Ti cards. Therefore, dictionary-based attacks are a necessity as modern cryptography adds more complexity and obstacles when relying only on a brute-force attack.
Taking into account current 302 large archives packed with username:passwords tuples, Passvorto knows following unique resources:
Passvorto data sources includes various database leaks (e.g., LinkedIn), exploited services (e.g.,