Mask setup - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Mask setup (/thread-3352.html) |
Mask setup - JulioQc - 05-06-2014 Hello, I'm trying to specify a particular mask for brute force. I currently use the following argument: Code: ?u?d ?1?1?1?1?1?1?1?1 8 digits, uppercase only, all numerical However, I know for a fact the password has a maximum/minimum of 4 upper case letters and 4 numerical. They can be anywhere in this 8 digit sequence. Example: Code: A56BG76Y How can I specify this? Thanks RE: Mask setup - coolbry95 - 05-06-2014 Just checking but are you doing -1 ?u?d ?1?1?1?1?1?1?1?1 Also there is not a way you can do that. What you have it correct. RE: Mask setup - JulioQc - 05-06-2014 Yes it does work fine but it wastes much time trying combinations that have more (or less) then 4 uppercase letters or numbers. i.e. A0000001 is a big waste of time because I know its not the password format. I doubt its impossible to accomplish, maybe using a dictionary generator or rules rather then a mask could work maybe. Being able to do so would be a HUGE performance gain. RE: Mask setup - undeath - 05-06-2014 you can generate all masks for 8 chars upper/num and filter out the ones which do not have 4 upper/num chars. echo uuuudddd | ./permute.bin | sort -u | sed 's/\(.\)/?\1/g' > masks.hcmask note: permute.bin from hashcat-utils RE: Mask setup - JulioQc - 05-06-2014 Yeah that sounds like a great solution! I'm in windows environment for now so so installed sed.exe from GnuWin32 but the 's/\(.\)/?\1/g' argument doesn't want to accept the ? I've tried without success (sed.exe: -e expression #1, char 8: unknown command: `?'): sed.exe "/\(.\)/?\1/g" I'll try to figure it out but suggestions are welcomed RE: Mask setup - undeath - 05-07-2014 you are missing the starting "s" for the sed command RE: Mask setup - JulioQc - 05-07-2014 so obvious! hehe thanks The masks in the generated file are exactly what I was hoping (little editing to do). It went from 345 days at best to crack to 12 hours!!! Amazing! I already know the password, lets see if oclhashcat can find it now Thanks again for the help! RE: Mask setup - atom - 05-08-2014 Wait, there's a tool that generates the neccessary masks to target advanced password policies, it's called PACK: http://thesprawl.org/projects/pack/ |