Unable to crack a simple fake password with dictionary and dive.rule - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Unable to crack a simple fake password with dictionary and dive.rule (/thread-10579.html) |
Unable to crack a simple fake password with dictionary and dive.rule - fabman - 01-13-2022 I'm learning how to use hashcat, I more or less understand how brute force attacks works, but I'm still struggling with the dictionary and rules attacks. So I created a md5 hash e7624f83b5aa81ca40b1a4d40b2288ae from the fake password "JohnSmith" ( without the quotes ) for testing. Then I created a dictionary personal.dict with the words: Code: John Then I tried to "crack" the hash with that dictionary and the dive.rule but hashcat finished without finding the password. I know I must be doing something wrong, but I can't find what. Code: hashcat -w 3 -m 0 -a 0 -r ./rules/dive.rule e7624f83b5aa81ca40b1a4d40b2288ae ./dict/personal.dict Code: Session..........: hashcat Update: I just tried with best64.rule and combinator.rule and it doesn't find anything. For what I understand any of those rule sets should include one rule that put two words of the dictionary one after the other, shouldn't they?. RE: Unable to crack a simple fake password with dictionary and dive.rule - Banaanhangwagen - 01-13-2022 In order to combine words of a dictionary with each other, you need to use -a 1. More explanation and examples are found here: https://hashcat.net/wiki/doku.php?id=combinator_attack |