Combination attack and rules how? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Combination attack and rules how? (/thread-6406.html) Pages:
1
2
|
RE: Combination attack and rules how? - jimby - 03-24-2017 Quote: So you mean to get output txt file from comboleetor then use hybrid attack on that file to get a new txt file? To get this done: 1. Create the blocks.txt file and the numbers.txt file 2. Use comboleetor.pl to create the password file 3. Run hashcat with the password file you just created Quote: cause i dont want to set ?d?d?d to the text file i want it to test "password1" up to "password10" "password11" up to "password99" "password100" up to "password999" Ok, this is different from what you said before. Earlier you said "password000" through "password999". This *includes leading zeros*, which is why the jot command above has a print format specification. "password1" through "password999" does not include leading zeros. You'll have to consult the man page for jot(1) to learn how to create numbers without leading zeros. Quote: same with symbols so for now i after i use comboleetor i have a text file with "helloworld" so i want to pipe it to get "helloworld1 - helloworld999" "helloworld@ - helloeworld@#$ The comboleetor.pl script will put the text, numbers, and punctuation together. blocks.txt ------------ helloworld numbers.txt ---------------- 000 001 002 003 ... output from jot command above *with* print format specification. or numbers.txt ---------------- 1 2 3 ... output from jot command above *without* print format specification. If you want *up to three* character of punctuation at the end: echo 'BNPPP' | perl comboleetor.pl > password.txt Then use the password.txt file with hashcat. |