hashcat Forum
Exploiting the human factor - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Exploiting the human factor (/thread-8656.html)

Pages: 1 2


Exploiting the human factor - Pilsener - 09-21-2019

The Enigma was cracked much due to the human factor and the human errors.
So I thought: How about making a mask that will run a brute force attack that will cover most of the human laziness?

My first thoughts:
1. Password length set to 8-10 chars.  
2. First letter may be uppercase or lowercase.
3. Last 1-3 chars is probably lowercase or numbers.


What's your thoughts about this approach, and what should be included, without making a mask that takes "forever" to run?


RE: Exploiting the human factor - royce - 09-21-2019

That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified.

It defaults to this mask:

-1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d


RE: Exploiting the human factor - Pilsener - 09-21-2019

Can this mask be set to increment the length of 8-10 chars?


RE: Exploiting the human factor - royce - 09-21-2019

Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max.


RE: Exploiting the human factor - Pilsener - 09-21-2019

What util should I use to make a mask according to my specs listed above? (head is not fully operational after being at work today).


RE: Exploiting the human factor - royce - 09-21-2019

No utility necessary - honest. Big Grin Study the default, understand how it works, and then adapt it to your needs. Big Grin


RE: Exploiting the human factor - Pilsener - 09-21-2019

I think I need to make a masks file to cover it exactly as I want, but mask processor does not have the options I need.


RE: Exploiting the human factor - philsmd - 09-21-2019

just create the hashcat mask file (a.hcmask) manually:
Code:
?l?u,?l?d,?1?a?a?a?a?2?2?2
?l?u,?l?d,?1?a?a?a?a?a?2?2?2
?l?u,?l?d,?1?a?a?a?a?a?a?2?2?2

Code:
hashcat -m 2500 -a 3 -w 3 hash a.hcmask


note: of course you can modify this in any shape or form you like, e.g. using ?l (lowercase letters) instead of ?a (which is much huger, i.e. ?l?u?d?s)


RE: Exploiting the human factor - Pilsener - 09-21-2019

I made a hcmask-file looking like this:

?l?l?l?l?l?l?l?l
?l?l?l?l?l?l?l?l?l
?l?l?l?l?l?l?l?l?l?l

?u?l?l?l?l?l?l?l
?u?l?l?l?l?l?l?l?l
?u?l?l?l?l?l?l?l?l?l

?l?l?l?l?l?l?l?d
?l?l?l?l?l?l?d?d
?l?l?l?l?l?d?d?d

?l?l?l?l?l?l?l?l?d
?l?l?l?l?l?l?l?d?d
?l?l?l?l?l?l?d?d?d

?l?l?l?l?l?l?l?l?l?d
?l?l?l?l?l?l?l?l?d?d
?l?l?l?l?l?l?l?d?d?d

?u?l?l?l?l?l?l?d
?u?l?l?l?l?l?d?d
?u?l?l?l?l?d?d?d

?u?l?l?l?l?l?l?l?d
?u?l?l?l?l?l?l?d?d
?u?l?l?l?l?l?d?d?d

?u?l?l?l?l?l?l?l?l?d
?u?l?l?l?l?l?l?l?d?d
?u?l?l?l?l?l?l?d?d?d



I think it covers all the combinations I wanted.
Worth a try. It says it will take 11 days to complete, which is acceptable.

But I'm still interested in suggestions for modifications.


RE: Exploiting the human factor - philsmd - 09-21-2019

lol, it will take 11 days just for the first one

that's also why brute-force is not usually the best strategy, but it of course depends a lot on the info you have and especially how confident you are that the passwords are 100% randomly generated and not human-choosen

btw: sometimes it's better to prefer masks with larger keyspace, because they can be accelerated better (depending also on the hash type etc). e.g. ?l?l?l?l?l?l?l?l and ?u?l?l?l?l?l?l?l is equivalent as ?l?u,?1?l?l?l?l?l?l?l , but the second one might peform (sligthly) better, of course a set of ?a?a?a... at the start would allow even more acceleration