hashcat Forum

Full Version: switch automatically from wordlist to bf (NTLM)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello forum,

for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)

# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst


How?


Thank you very much!


Joe
(07-23-2022, 02:23 PM)joe123 Wrote: [ -> ]Hello forum,

for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)

# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst


How?


Thank you very much!


Joe

No, it is not possible
->No, it is not possible
I am wondering why.. Would that not be a cool feature?
(07-23-2022, 02:23 PM)joe123 Wrote: [ -> ]Hello forum,

for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)

# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst


How?


Thank you very much!


Joe

Hashcat can't do it, but you could just write a small script that executes the one followed by the other.
(07-23-2022, 02:23 PM)joe123 Wrote: [ -> ]Hello forum,

for the case the password is not found with wordlist.lst, is it possible to have hashcat automatically switched to brute force mode (e.g. up to 9 char password, all printable chars)

# hashcat -m 1000 -a 0 --force --show --username hash.txt wordlist.lst
How?
Thank you very much!
Joe

NEVER user --force 

also remove the --show because --show will not crack anything, --show is for showing already cracked passwords

the basic command, only things added is -r rules (copy the rules from rules folder) and -O for optimized kernel to speed up things

Code:
hashcat -a0 -m1000 -O --username -r best64.rule hash.txt wordlist.lst
hi forum, ... snoopy,

as mentioned, not to use --force, is tried the following command and got the message (without --force i can't execute any command)

mymask.hcmask (content)
-------------------
?l?u?d#, ?1?1?1?1?1?1?1?1?1?1

$ hashcat -a 3 -m 9400 -o pass.txt htag-hash mymask.hcmask -i --increment-min=6 --session mymask
hashcat (v6.2.5-650-g99be4f9fd) starting

* Device #1: Outdated POCL OpenCL driver detected!

This OpenCL driver may fail kernel compilation or produce false negatives.
We recommend using a version of POCL >= 1.9
You can use --force to override, but do not report related errors.

No devices found/left.

Started: Fri Aug  5 12:19:14 2022
Stopped: Fri Aug  5 12:19:14 2022


help me to resolve the situation. thanks in advance.
Hashcat is telling you exactly what is needing to be done to not have errors.

* Device #1: Outdated POCL OpenCL driver detected!

This OpenCL driver may fail kernel compilation or produce false negatives.
We recommend using a version of POCL >= 1.9

If you don't resolve this issue and use --force you may not even find the password even if it is correctly guessed.