09-14-2023, 04:02 PM
09-18-2023, 05:47 PM
(09-14-2023, 04:02 PM)Darksoul1 Wrote: [ -> ]Is it possible to limit the password length? Prince processor doesn't support rules, so there is no way to limit it after applying a rule.
See "Rules used to reject plains" in https://hashcat.net/wiki/doku.php?id=rule_based_attack
09-18-2023, 06:30 PM
(09-18-2023, 05:47 PM)b8vr Wrote: [ -> ](09-14-2023, 04:02 PM)Darksoul1 Wrote: [ -> ]Is it possible to limit the password length? Prince processor doesn't support rules, so there is no way to limit it after applying a rule.
See "Rules used to reject plains" in https://hashcat.net/wiki/doku.php?id=rule_based_attack
I looked at that, and it says it won't work without -j -k. I do not want to use these.
09-25-2023, 05:00 AM
(09-18-2023, 06:30 PM)Darksoul1 Wrote: [ -> ](09-18-2023, 05:47 PM)b8vr Wrote: [ -> ](09-14-2023, 04:02 PM)Darksoul1 Wrote: [ -> ]Is it possible to limit the password length? Prince processor doesn't support rules, so there is no way to limit it after applying a rule.
See "Rules used to reject plains" in https://hashcat.net/wiki/doku.php?id=rule_based_attack
I looked at that, and it says it won't work without -j -k. I do not want to use these.
Sorry, but it seems that your options for limiting password length in Hashcat are indeed somewhat limited unless you're willing to go through a lengthy process of creating your own wordlist with the desired password length. Hashcat primarily relies on rules, the `-j`, and `-k` flags for such tasks, which you mentioned you'd prefer not to use.
Creating a custom wordlist with passwords of the exact length you want can be a time-consuming process, but it provides you with more control over the passwords you attempt to crack. If you decide to go down this route, there are various tools and scripts available that can assist in generating wordlists with specific password lengths.
Please let us know if you have any further questions or if there's anything else we can assist you with.