hashcat Forum
Combinator Attack Rule Limits - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: Combinator Attack Rule Limits (/thread-3435.html)



Combinator Attack Rule Limits - globus - 05-28-2014

I was hoping to do a multi-character toggle and I'm having some issues.

Here's the command:
oclHashcat64.bin -m 1000 NTLMhashes -a 1 Dictionary1 Dictionary2 -j "T1 T2 T3 T4 T5 T6" -k "T0"

After messing around with the -j and -k options, I was able get it work with a couple of characters being toggled in each (-j "T0 T1"). But when I go to toggle 6 characters, it isn't cracking a hash that it should.

Dictionary1 contents:
PASSWOR
Dictionary2 contents:
D123

Attempted password to crack: Password123

Am I wrong in thinking that
-j "T1 T2 T3 T4 T5 T6" -k "T0"
Should get me Password123? Or is there a rule limit that I'm not aware of.


RE: Combinator Attack Rule Limits - atom - 05-30-2014

Hey Globus,

The rule and the commandline you provided should crack the hash, yes. I tried to reproduce this with latest oclHashcat but can't. Maybe you use an older version? See my log:

Quote:root@sf:~/oclHashcat-1.22# echo PASSWOR > dict1
root@sf:~/oclHashcat-1.22# echo D123 > dict2
root@sf:~/oclHashcat-1.22# echo -n Password123 | iconv -t utf16le | openssl dgst -md4
(stdin)= 58a478135a93ac3bf058a5ea0e8fdb71
root@sf:~/oclHashcat-1.22# ./oclHashcat64.bin -d1 58a478135a93ac3bf058a5ea0e8fdb71 -m1000 -a1 dict1 dict2 -j "T1 T2 T3 T4 T5 T6" -k "T0" --weak-hash-threshold 0 --potfile-disable --quiet
58a478135a93ac3bf058a5ea0e8fdb71Tongueassword123



RE: Combinator Attack Rule Limits - globus - 06-05-2014

Hi Atom,

I was using an old version. I'll update and give it another try. Thanks.