hashcat Forum
Rejection of passwords with a length of 8 or more characters using rules. - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Rejection of passwords with a length of 8 or more characters using rules. (/thread-11370.html)



Rejection of passwords with a length of 8 or more characters using rules. - 174region174 - 03-31-2023

I ran into a problem when searching for passwords.
For some types of hashes, the password length cannot be less than 8 characters.
If the password is in the dictionary, it will be found successfully.
 For example, I'll take this password...
johny1980
But if I want to find this password using  names + rules with dates, it will be rejected.
johny +  rule $1 $9 $8 $0
This is due to the fact that a word in the dictionary consists of less than 8 characters. How can I solve this problem? What option can be added to the command line so that it is not rejected?


RE: Rejection of passwords with a length of 8 or more characters using rules. - b8vr - 03-31-2023

You should consider piping:
hashcat wordlist -r ruleset --stdout | hashcat -m mode


RE: Rejection of passwords with a length of 8 or more characters using rules. - 174region174 - 04-01-2023

Yeah... I have used this search method before. But at the same time, there is a drop in speed. Is this happening just for me?Or is it happening to you too?


RE: Rejection of passwords with a length of 8 or more characters using rules. - ZerBea - 04-01-2023

I guess you mean hash mode 22000 which has a default minimum length of 8.
hashcat option -S will do the trick:
Code:
$ hashcat -m 22000 test.22000 -S -r test.rule wordlist

wordlist:
jojmy

test.rule:
$1 $9 $8 $0

Session..........: hashcat                                
Status...........: Exhausted
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: test.22000
Time.Started.....: Sat Apr  1 07:20:27 2023 (2 secs)
Time.Estimated...: Sat Apr  1 07:20:29 2023 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (wordlist)
Guess.Mod........: Rules (test.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:       70 H/s (0.30ms) @ Accel:8 Loops:128 Thr:256 Vec:1
Recovered........: 0/591 (0.00%) Digests (total), 0/591 (0.00%) Digests (new), 0/115 (0.00%) Salts
Progress.........: 115/115 (100.00%)
Rejected.........: 0/115 (0.00%)
Restore.Point....: 1/1 (100.00%)
Restore.Sub.#1...: Salt:114 Amplifier:0-1 Iteration:4-9
Candidate.Engine.: Host Generator + PCIe
Candidates.#1....: johny1980 -> johny1980
Hardware.Mon.#1..: Temp: 43c Util: 70% Core:1980MHz Mem:3500MHz Bus:8

Started: Sat Apr  1 07:20:26 2023
Stopped: Sat Apr  1 07:20:31 2023
Nothing will be rejected.


RE: Rejection of passwords with a length of 8 or more characters using rules. - 174region174 - 04-01-2023

YEah! it works. Thanks!!!