hashcat Forum
Improving the Rule-based attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Misc (https://hashcat.net/forum/forum-15.html)
+--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html)
+--- Thread: Improving the Rule-based attack (/thread-3290.html)



Improving the Rule-based attack - AmadorBR - 04-09-2014

I have a problem regarding custom rules what I need is simple but it does not know if it's possible because currently the Hachcat v.0.47 is not supported, and come to the problem.

Need to create rules so

Example 1

i6-1 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ ?1 i7-2 0123456789 ?2 i8-3 ABCDEFGHIJKLMNOPQRSTUVWXYZ ?3

OR

i6-1 0123456789 -2 ABCDEF ?1?2 i7-1 ABCDEF -2 0123456789 -3 !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ -4 abcdef ?1?2?3?4

OR

i6-1 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ (?1)?1?1?1?1?1?1?1?1[?1]
between parentheses = i6X
between brackets = iAX

However is not supported by the rules and mask is not possible this way creates.

Only then is supported

Example 2

i60 i70 i80 i90
i60 i70 i80 i91
i60 i70 i80 i92
i60 i70 i80 i93
i60 i70 i80 i94
i60 i70 i80 i95
i60 i70 i80 i96
i60 i70 i80 i97
i60 i70 i80 i98
i60 i70 i80 i99
i60 i70 i80 i9A
i60 i70 i80 i9B
i60 i70 i80 i9C
i60 i70 i80 i9D
i60 i70 i80 i9E
i60 i70 i80 i9F
i60 i70 i80 i9G
i60 i70 i80 i9H
i60 i70 i80 i9I
i60 i70 i80 i9J
i60 i70 i80 i9K
i60 i70 i80 i9L
i60 i70 i80 i9M
i60 i70 i80 i9N
i60 i70 i80 i9O
i60 i70 i80 i9P
i60 i70 i80 i9Q
i60 i70 i80 i9R
i60 i70 i80 i9S
i60 i70 i80 i9T
i60 i70 i80 i9U
i60 i70 i80 i9V
i60 i70 i80 i9W
i60 i70 i80 i9X
i60 i70 i80 i9Y
i60 i70 i80 i9Z
i60 i70 i81 i90
i60 i70 i81 i91
i60 i70 i81 i92
i60 i70 i81 i93
i60 i70 i81 i94
i60 i70 i81 i95
i60 i70 i81 i96
i60 i70 i81 i97
i60 i70 i81 i98
i60 i70 i81 i99
i60 i70 i81 i9A
i60 i70 i81 i9B
i60 i70 i81 i9C
i60 i70 i81 i9D
i60 i70 i81 i9E
i60 i70 i81 i9F
i60 i70 i81 i9G
i60 i70 i81 i9H
i60 i70 i81 i9I
i60 i70 i81 i9J
i60 i70 i81 i9K
i60 i70 i81 i9L
i60 i70 i81 i9M
i60 i70 i81 i9N
i60 i70 i81 i9O
i60 i70 i81 i9P
i60 i70 i81 i9Q
i60 i70 i81 i9R
i60 i70 i81 i9S
i60 i70 i81 i9T
i60 i70 i81 i9U
i60 i70 i81 i9V
i60 i70 i81 i9W
i60 i70 i81 i9X
i60 i70 i81 i9Y
i60 i70 i81 i9Z
...

What makes the process of creating a Herculean labor rules

It would be possible to have support built-in charsets?
?l ?u ?d ?s ?a ?h ?D ?F ?R
to the rules in the next versions of hashcat?

Would be possible by support masks for the rules?

Is there another way I can create rules both in Example 1 as in Example 2 automated? If there is no way to create automated Example 1, Example 2 is possible in this version of Hashcat?

If not, someone here has a suggestion for how I create Example 2 automated rule?

Is there any limitation on the method that I propose?

Compensates to brute force based on rules?

How many percent acceleration implementation we could have with this method?

Just do not want to write a rule Example 2 manually :/

In theory, I want to break the "ualpha-numeric" key, but create "ualpha-numeric" size 7+ wordlist becomes strained by the size of the wordlist to be generated, so with that in mind I want to create the "ualpha-numeric" wordlist size 6 characters and make key with the rest of the rule ( i = insert ) or even make brute force exclusively by the rules only doubt i have is offset, if in practice we would have more computational efficiency in the process if the process of making brute force by rules is faster than the classical brute force. But to create the rule to make the rest of the key to be broken the way it currently ta becomes a Herculean task therefore becomes indispensable enhance the rules for support masks (or otherwise ) of the rules.
The unique rules that could benefit from this new method I propose are:

Insert N @ X iNX Inserts character at position N

and

Overwrite @ N oNX character at postion N with X

But as anybody there who are the geniuses behind the project feel free to create whatever they want I just thank.

I thank any other trick inform


RE: Theory to "Brute force attack rule-based" OR "Attack hybrid diction... - epixoip - 04-09-2014

is there a tl;dr version of this post somewhere? preferably in english?

(04-09-2014, 09:57 PM)AmadorBR Wrote: What makes the process of creating a Herculean labor rules

i have absolutely no idea what this is supposed to mean. so... 7?

(04-09-2014, 09:57 PM)AmadorBR Wrote: It would be possible to have support built-in charsets?

hashcat already has this, and more.

(04-09-2014, 09:57 PM)AmadorBR Wrote: Would be possible by support masks for the rules?

no.

(04-09-2014, 09:57 PM)AmadorBR Wrote: Is there another way I can create rules both in Example 1 as in Example 2 automated?

use maskprocessor to generate the rules.

(04-09-2014, 09:57 PM)AmadorBR Wrote: Pays to brute force based on rules?

like... money?

(04-09-2014, 09:57 PM)AmadorBR Wrote: How many percent acceleration impementação we could have with this method?

17?


RE: Theory to "Brute force attack rule-based" OR "Attack hybrid dictionary/rules" - AmadorBR - 04-10-2014

Google translation :E

But the problem with creating the rules by maskprocessor example 2 is the size of the file to be generated, I know not of miracles to do with the numbers will be even higher 32 the size of the key in this case, why would I say that so masks better, but since it is not yet possible thanks anyway any news we're watching.


RE: Theory to "Brute force attack rule-based" OR "Attack hybrid dictionary/rules" - AmadorBR - 04-10-2014

For me, the ideal would be if there was support for example 1 rules, but since it is not supported yet, I look forward to one day be possible maskprocessor per hour will use the same to create the rule example 2 there is the idea thank force !


RE: Theory to "Brute force attack rule-based" OR "Attack hybrid dictionary/rules" - epixoip - 04-11-2014

the size would be the same regardless (in terms of keyspace), implementing a mask processor into the rule engine would not change this fact.


RE: Improving the Rule-based attack - AmadorBR - 04-11-2014

It's true, but in a test here, I noticed limitations, requires a lot of RAM to load the "rulelist" (created by maskprocessor), outside the size of the "rulelist" being generated (for cases of i0X for iZX), I know that maybe with the implementation of the support for masks for the rules also would use a lot of RAM to load the rules virtually (not using the "rulelist" as in example 1) so I thought maybe index the amount of plains, the be generated (as with the words) could work, but they are just ideas, we also know that to predict the amount of plains to be generated for the process, so to make the count of the plains as it appears currently with the words that would lead to the creation of the option to continue the plain where stopped in the previous section. I'm thinking about how to improve the process of Plains and the Permutation (which involves Plains) more ideas I describe.


RE: Improving the Rule-based attack - undeath - 04-13-2014

feel free to post a feature request on trac (https://hashcat.net/trac/ ), but i doubt this will be implemented any time soon if ever.