hashcat Forum
PrinceProcessor - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip (https://hashcat.net/forum/forum-28.html)
+--- Thread: PrinceProcessor (/thread-7525.html)



PrinceProcessor - captmeoff - 05-23-2018

I have an older WPA2 hccap file with a known xkcd-style password. For sake of discussion, let's say password is barnrabbitstampfork. If I manually create .txt file with said password and run -a 0, cudaHashcat64.bin finds it fine.  

If I create a dictionary file with only:

barn
rabbit
stamp
fork

#./pp64.bin < dictionary.txt | grep ^barnrabbit
barnrabbit
barnrabbitbarn
barnrabbitfork
barnrabbitstamp
barnrabbitrabbit

It doesn't generate the barnrabbitstampfork combination.  I'm missing something, but don't know what.  Is there a length limitation?


RE: PrinceProcessor - royce - 05-23-2018

There is indeed a max length for princeprocessor.

https://github.com/hashcat/princeprocessor/blob/master/src/pp.c#L32

You'll need to modify the source, increase PW_MAX to at least 20 (in your case), and recompile.


RE: PrinceProcessor - unix-ninja - 05-23-2018

I am not sure prince processor is actually what you want. Checkout hashcat-utils, you may have some better luck there. Look at the combinators and combipow first. That's likely to get you closer to what you want.


RE: PrinceProcessor - royce - 05-23-2018

If we assume that the four words are Diceware-style, and truly chosen at random from a list, then for a four-word passphrase, princeprocessor would properly try "barnbarnbarnbarn', etc, but IIRC combipow will not.  Also, IIRC combipow is limited to a very short wordlist (like 64 words or something?). And getting the combinators to do four words is non-trivial. So I think recompiled princeprocessor is a pretty good fit here.

And you'll want to use "--elem-cnt-min=4" and "--elem-cnt-max=4" parameters to confine pp64 to exactly four words.

(And actually, if I had my druthers, if princeprocessor could be updated to accept a larger PW_MAX as a cmdline switch (even by significantly multiplying the size of the binary, by having multiple chunks of code, each optimized for a given PW_MAX), that would be cool, and make princeprocessor more suitable out of the box for this purpose)


RE: PrinceProcessor - captmeoff - 05-23-2018

(05-23-2018, 04:27 PM)royce Wrote: There is indeed a max length for princeprocessor.

https://github.com/hashcat/princeprocessor/blob/master/src/pp.c#L32

You'll need to modify the source, increase PW_MAX to at least 20 (in your case), and recompile.


Worked like a champ.  Now time to go do some benchmarks with varying wordlists we use.  Thanks for the quick response.


RE: PrinceProcessor - royce - 05-23-2018

YW. Make sure that PW_MAX is 4x the length of your longest word. Enjoy!


RE: PrinceProcessor - captmeoff - 05-23-2018

(05-23-2018, 05:20 PM)royce Wrote: YW. Make sure that PW_MAX is 4x the length of your longest word. Enjoy!

Will do.  What is the significance of 4x the longest word though?


RE: PrinceProcessor - royce - 05-24-2018

Assuming a dictionary whose longest word length is (for example) 12, and a four-word passphrase, then the maximum length of the entire passphrase is 12 x 4 = 48.