Having the option of not using a word in a combinatory attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip (https://hashcat.net/forum/forum-28.html) +--- Thread: Having the option of not using a word in a combinatory attack (/thread-10136.html) |
Having the option of not using a word in a combinatory attack - JuanPelota - 05-28-2021 Hello I am trying for sveral wks to crack an old ethereum wallet (#sigh) I have a blurred idea of what the password could be. To ease combinatory attacks and workload on my old CPU, I'd like to know if there is trick to avoir using a word from a list in a combinatory attack. Example My password might be Alphabeta99gamma or Alphabetagamma or Alphabeta9gamma I'd like to makee combination from two lists Let's say on the left part I have Alfa Alpha Alfabeta Alphabeta Alfabéta Alphabéta On the right I would have "blank" 9 99 and then a third part I could add lately So that in the end I could have a (big) list of variation of the first part of my passsword without the second part thanks to the "blank" I guess I could just pass a list of the left part of the password but actually it's a very simple example here and my password might be 50+ characters thanks to a passphrase with different characters between words, you get the idea ? Thanks RE: Having the option of not using a word in a combinatory attack - Snoopy - 05-28-2021 See https://github.com/hashcat/hashcat-utils/releases use: combinator left.txt right.txt > combi.txt resulting in combi.txt Alfa Alfa9 Alfa99 Alpha Alpha9 Alpha99 Alfabeta Alfabeta9 Alfabeta99 Alphabeta Alphabeta9 Alphabeta99 Alfabéta Alfabéta9 Alfabéta99 Alphabéta Alphabéta9 Alphabéta99 this combi.txt you can use for futher combinations, have fun RE: Having the option of not using a word in a combinatory attack - JuanPelota - 05-28-2021 thank you for your reply, I have not expressed myself well. The trick is that my password might be a combination of 11 or 12 words, so it makes a lots of combinatory and I get lost in combining all of this, especially when I add typos and slight variations in words. I will aslo dig the prince attack stuff RE: Having the option of not using a word in a combinatory attack - Snoopy - 05-28-2021 that would quite huge regarding the combinations, so yeah, give princeprocessor for that a try, there are options to tell prince to use min/max words from a list RE: Having the option of not using a word in a combinatory attack - newsbie - 10-23-2021 (05-28-2021, 05:55 PM)Snoopy Wrote: that would quite huge regarding the combinations, so yeah, give princeprocessor for that a try, there are options to tell prince to use min/max words from a list how to use princeprocessor RE: Having the option of not using a word in a combinatory attack - Snoopy - 10-26-2021 well prince processor help is quite straight forward, in your case the needed options would be --elem-cnt-min=NUM Minimum number of elements per chain --elem-cnt-max=NUM Maximum number of elements per chain so min would be 11 max 12 feed output from pp to hashcat through pipe like pp64 --elem-cnt-min=11 --elem-cnt-max=12 yourlist.txt | hashcat with appropiate options (mode etc.) but be aware 11 or 12 combinations from a quite huge list will result in na even more gigantic list |