![]() |
Combinator attack - all posibillities - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Combinator attack - all posibillities (/thread-8046.html) |
Combinator attack - all posibillities - oli28 - 01-01-2019 Hi guys, I am testing the combinator attack with my own wordlist, what I would need would be all the possibilities out of it, e.g. List1 Test1 Test2 Test3 List2 Hallo1 Hallo2 Hallo3 Canditates Test1Test2Hallo1 Test1Test1Hallo1 etc.. Is that somehow possible? Best O. https://hashcat.net/wiki/doku.php?id=combinator_attack RE: Combinator attack - all posibillities - undeath - 01-01-2019 merge all your lists and use princeprocessor RE: Combinator attack - all posibillities - oli28 - 01-01-2019 Thanks a lot, works like a charm. Is it correct that Hashcat can only encrypt Truecrypt >5? RE: Combinator attack - all posibillities - atom - 01-10-2019 Yes, only Truecrypt >5 |