hashcat Forum
smart bruteforce - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: smart bruteforce (/thread-4230.html)



smart bruteforce - bobva - 03-30-2015

i want to crack a password with this rules:
the len for the password is 8-9
the order of the letter is:
0-9: 0-3 chars
a-z:3-5 chars
A-Z: 1 char
!@#$%^ : 0-2 char

for example (Azsx@2#3)
i dont want to do a bruteforce for 0-9,a-z,A-z,!@#$%^ with len 8-9... this is a lot of years...

how can i make this rules in hashcat?

thank u
bob


RE: smart bruteforce - undeath - 03-30-2015

Create multiple masks that cover all possibilities and put them into a hcmask file.


RE: smart bruteforce - kartan - 03-30-2015

I know what you want to do but there is no completely straight forward method in achieving this as of now.
For that one example attack you posted I personally would probably go by undeath's method and generate every possible mask. However you can also take a look at statsprocessor. The default chain hashcat.hcstat which is derived from rockyou should give you like 70-80% of what you want. The benefit of this method is that your attack doesn't stop when the masks are exhausted, they just go all the way till the keyspace is exhausted if you so wish. Depending on your "mask" you might cook up a special hcstat to push your desired candidates to the top.


RE: smart bruteforce - undeath - 03-30-2015

so i was a bit bored. http://pastebin.com/6xYxPPZ8


RE: smart bruteforce - kartan - 03-31-2015

saved that shit


RE: smart bruteforce - bobva - 03-31-2015

(03-30-2015, 10:17 PM)undeath Wrote: so i was a bit bored. http://pastebin.com/6xYxPPZ8

Thanks very much for this code, how can i ran this python on hashcat??


RE: smart bruteforce - bobva - 04-01-2015

(03-30-2015, 10:17 PM)undeath Wrote: so i was a bit bored. http://pastebin.com/6xYxPPZ8

i make a hcmask file with your python.
but i get ?l?l?l?l?l?u?s?s in the first line

if a run the hash cat with this mask file the hashcat try to crack only this order... like aaaaaA@#
and dont try aaaaa@A#

how can i make all the option

thank u


RE: smart bruteforce - undeath - 04-02-2015

You seem to be using the word "order" wrongly which led to some confusion. If you want to match a password policy have a look at PACK https://thesprawl.org/projects/pack/


RE: smart bruteforce - ciphercodes - 04-05-2015

Try this..

Code:
?d?d?d?l?l?l?l?l?u
?d?d?d?l?l?l?l?u
?d?d?d?l?l?l?l?u?s
?d?d?d?l?l?l?u?s
?d?d?d?l?l?l?u?s?s
?d?d?l?l?l?l?l?u
?d?d?l?l?l?l?l?u?s
?d?d?l?l?l?l?u?s
?d?d?l?l?l?l?u?s?s
?d?d?l?l?l?u?s?s
?d?l?l?l?l?l?u?s
?d?l?l?l?l?l?u?s?s
?d?l?l?l?l?u?s?s
?l?l?l?l?l?u?s?s



RE: smart bruteforce - bsec - 04-06-2015

Generated using policygen.py from PACK, hcmask file: https://www.sendspace.com/file/c1pnfq

Quote:$ wc -l bobva.hcmask
24234 bobva.hcmask

random lines:

?d?d?d?l?l?d?l?u
?d?d?d?l?l?d?u?l
?d?d?d?l?l?l?d?u
?d?d?d?l?l?l?l?u
?d?d?d?l?l?l?u?d
?d?d?d?l?l?l?u?l
!@#$%^,?d?d?d?l?l?l?u?1
!@#$%^,?d?d?d?l?l?l?1?u
?d?d?d?l?l?u?d?l
?d?d?d?l?l?u?l?d
?d?d?d?l?l?u?l?l
!@#$%^,?d?d?d?l?l?u?l?1
!@#$%^,?d?d?d?l?l?u?1?l
!@#$%^,?d?d?d?l?l?1?l?u
!@#$%^,?d?d?d?l?l?1?u?l
!@#$%^,?1?1?u?l?l?d?l?d?l
!@#$%^,?1?1?u?l?l?d?l?l?d
!@#$%^,?1?1?u?l?l?d?l?l?l
!@#$%^,?1?1?u?l?l?l?d?d?d
!@#$%^,?1?1?u?l?l?l?d?d?l
!@#$%^,?1?1?u?l?l?l?d?l?d
!@#$%^,?1?1?u?l?l?l?d?l?l
!@#$%^,?1?1?u?l?l?l?l?d?d
!@#$%^,?1?1?u?l?l?l?l?d?l
!@#$%^,?1?1?u?l?l?l?l?l?d