Rejection of passwords with a length of 8 or more characters using rules. - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Rejection of passwords with a length of 8 or more characters using rules. (/thread-11370.html) |
Rejection of passwords with a length of 8 or more characters using rules. - 174region174 - 03-31-2023 I ran into a problem when searching for passwords. For some types of hashes, the password length cannot be less than 8 characters. If the password is in the dictionary, it will be found successfully. For example, I'll take this password... johny1980 But if I want to find this password using names + rules with dates, it will be rejected. johny + rule $1 $9 $8 $0 This is due to the fact that a word in the dictionary consists of less than 8 characters. How can I solve this problem? What option can be added to the command line so that it is not rejected? RE: Rejection of passwords with a length of 8 or more characters using rules. - b8vr - 03-31-2023 You should consider piping: hashcat wordlist -r ruleset --stdout | hashcat -m mode RE: Rejection of passwords with a length of 8 or more characters using rules. - 174region174 - 04-01-2023 Yeah... I have used this search method before. But at the same time, there is a drop in speed. Is this happening just for me?Or is it happening to you too? RE: Rejection of passwords with a length of 8 or more characters using rules. - ZerBea - 04-01-2023 I guess you mean hash mode 22000 which has a default minimum length of 8. hashcat option -S will do the trick: Code: $ hashcat -m 22000 test.22000 -S -r test.rule wordlist RE: Rejection of passwords with a length of 8 or more characters using rules. - 174region174 - 04-01-2023 YEah! it works. Thanks!!! |