how can I crack repeated password with brute forcing? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Developer (https://hashcat.net/forum/forum-39.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-40.html) +--- Thread: how can I crack repeated password with brute forcing? (/thread-11359.html) |
how can I crack repeated password with brute forcing? - chicken - 03-23-2023 Hi. I'm trying to crack MD5 hash made from repeated password. P@ssw0rd become P@ssw0rdP@ssw0rd before It's hashed for example. I tried like this hashcat -a 3 -0 -r duplicate.rule -i '?a?a?a?a?a?a?a?a' hashfile but it said -r option only supports -a 0. so I tried stdin mode to use -r option but it was veeerrry slow. Any good solution about that? RE: how can I crack repeated password with brute forcing? - Snoopy - 03-23-2023 (03-23-2023, 10:03 AM)chicken Wrote: Hi. you are mixing up 2 different attack types -a3 is bruteforce so its basically testing every combination of every char in your charset, for rules you need -a0 and a dictionary file, a dictionary is a list of passwordcanditates lets assume file dictionary.txt contains 1 2 3 a b c with a rulefile containing two lines : p1 for description opf the rules see https://hashcat.net/wiki/doku.php?id=rule_based_attack you will get the basic dictionary content and 11 22 33 aa bb cc but you will need a dictionary file for that, you could start with these lists https://hashmob.net/resources/hashmob |