hashcat Forum
Some rules for mask_attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: Some rules for mask_attack (/thread-3084.html)



Some rules for mask_attack - d426799 - 01-28-2014

Hello,
I'm a brand new user for hashcat and I need help with something. I just lost my own password and I'm trying to get it. I'm mask attacking to the hash but the problem is it takes so much time. The thing I entered is this one.
oclHashcat64.exe -m 5200 -a 3 -1 bNJh123456789! -o cracked.txt 123.psafe3 ?1?1?1?1?1?1?1?1?1?1
And the thing that I know about my password is bN and Jh is like that. For example my password could be something like that 57bN48Jh3!
How do I make "bN" and "Jh" like that so it just take this two character as one? And it was just an example since my password can be either 7-8-9-10 characters. (I'm not really sure)

Thanks for advance


RE: Some rules for mask_attack - mastercracker - 01-29-2014

You will have to enumerate all masks one by one for each length in a mask file (.hcmask). It will take time to make that file but after it should be quick to crack since the maximum keyspace that you will have to cover is 6 (10 minus 4 for the bN and Jh). Examples for the mask file:

len7
bNJh?1?1?1
bN?1Jh?1?1
bN?1?1Jh?1
...
len10
bNjH?1?1?1?1?1?1
...
?1?1?1bN?1?1jH?1
...

EDIT: Ok. I don't know what speed you will have for this algo so it might not be that quick but it's definitely feasible.


RE: Some rules for mask_attack - atom - 01-29-2014

Also make sure to remove bN and jH from -1 when doing what mastercracker suggested


RE: Some rules for mask_attack - d426799 - 01-29-2014

Thank you so much, I'll try to do that now.


RE: Some rules for mask_attack - d426799 - 01-29-2014

Yes! After 3 days, I just paused the other one and try this one. It found immediately! Thank you so much ^^