![]() |
Understanding hybrid_attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: Understanding hybrid_attack (/thread-2492.html) |
Understanding hybrid_attack - babele - 08-04-2013 Hi All, I've some troubles in understanding how the hybrid_attack works. what I would like to achieve is to try the follow chars pattern prepended to each of the words from the dictionary Code: [a-z0-9]+(.|_)[a-z0-9]+DICT_WORD I'd like to have the keyspace incremental so that it will start from 3 chars up to X chars: Code: a.aDICT_WORD Any help is really appreciated RE: Understanding hybrid_attack - Rolf - 08-04-2013 Hashcat/Oclhc does not have pre-processing, but that doesn't mean you can't do what you want with the mutation engine. Use maskprocessor to generate the rules: Code: mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?1^?2^?2^?2 -o rules.txt This is one way of doing it. |