[[Hashcat]] Brain will keep track of what password candidates have already been
tried against a target hashlist. Using two in-memory databases and a client/server architecture, Hashcat will check the BRAIN for duplicate password guess attempts across attacks and reject ones that have already been attempted. This feature will radically change the way you approach long-term and group coordinated cracking jobs. Caveat is that the BRAIN function performs much more efficiently on SLOW hash types (roughly< 650kH/s) so be aware when trying to use it against something like NTLM.
https://hashcat.net/forum/thread-7903.html
OPTIONS
```
--brain-server start hashcat brain server
--brain-client start hashcat brain client, auto activates --slow-candidates
--brain-host & --brain-port ip/port of brain server for listening & connecting
--brain-session override automatically calculated brain session ID
--brain-session-whitelist allow only explicit written session ID on brain server
--brain-password specify brain server authentication password
--brain-client-features enable and disable certain features of hashcat brain
```
TERMINAL WINDOW #1 Start Local BRAIN Server
```
hashcat --brain-server
1547086922.385610 I 0.00s
74fe414aede50622
1547086922.385792 0.00s
0
0
Generated authentication password:
Brain server started
```
TERMINAL WINDOW #2 Connect Local BRAIN Client
```
hashcat -a 0 -m # hash.txt dict.txt -z --brain-password 74fe414aede50622
```
[[Home]]
#tools
#advanced