![]() |
Smart Brutforce? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Smart Brutforce? (/thread-8460.html) |
Smart Brutforce? - LowFreeKey - 07-03-2019 Hey, is there anyway that I am able to modify tHE attack in that the variation completely skips over any possible combination containing recurring alpha numeric char. I.E "aajfajfwja" or "bbbmagic" etc... Also is anyone aware of a website on which I can play with these variables and get an ETA or simply amount of possible combinations. RE: Smart Brutforce? - undeath - 07-04-2019 You can use PACK to match a specific password policy or play around with hashcat's mask attack and the -t argument. Unfortunately with -t it's not possible to later resume an attack by using a higher threshold. |