![]() |
Integer overflow detected in keyspace of mask [hybrid attack] - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Integer overflow detected in keyspace of mask [hybrid attack] (/thread-12143.html) |
Integer overflow detected in keyspace of mask [hybrid attack] - shadrach - 09-04-2024 Hi, I want your opinion on what I might be doing wrong. So I have only a part of a password, let's call it "qwer_4tyo". This half of the password is lowercase and is only a hint as the final password might actually have one or more uppercase letters (e.g. qwEr_4tyO ), so this calls for a toggle attack first and then an extension through a mask attack. What I did first is I ran hashcat with this command to create a small dictionary with all uppercase variations: Code: echo "qwer_4tyo" | hashcat --stdout -r /path/to/hashcat/rules/toggles5.rule > base_wordlist.txt Then once I have this dictionary, I ran a hybrid attack, with a mask of 6 ?a appended. Code: hashcat -m 120 -a 6 -O --increment --increment-min=1 --increment-max=6 salted_hash.txt dictionaries\ar.txt ?a?a?a?a?a?a But I run into two issues:
Is there a more elegant way for me to figure out the other half of the password? So keep in mind that I need to run a toggle-case attack first with an extension of up to 5 or 6 other characters (upper,lower,digit and special). Any ideas? Thanks |