maskprocessor -- reversing increments - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip (https://hashcat.net/forum/forum-28.html) +--- Thread: maskprocessor -- reversing increments (/thread-923.html) |
maskprocessor -- reversing increments - TAPE - 02-14-2012 Hey all, I have been playing around with maskprocessor emulating bruteforce and was wondering whether it is possible to reverse the incrementation. I'll try to explain what I am trying as best as possible ; If we know that the first 4 characters of an 8-10 character WPA passphrase are 'abcd' followed by lower alpha characters then you would be able to start maskprocessor with increments as follows ; Code: mp64.exe -i --increment-min=8 abcd?l?l?l?l?l?l If on the other hand you know that the last 4 characters are for instance 'wxyz' is there a way to have the first characters increment from 4 to 6 characters or is manual the only way to go ? as Code: mp64.exe -i --increment-min=8 ?l?l?l?l?l?lwxyz I am not sure if this is even possible, but I am a complete newb with maskprocessor, so any guidance from the pros much appreciated ! RE: maskprocessor -- reversing increments - atom - 02-14-2012 Why not using a rule? Something like this should work: echo $w$x$y$z > rule mp64 -i ?l?l?l?l?l?l | oclHashcat-plus64 -r rule -m 2500 ... RE: maskprocessor -- reversing increments - TAPE - 02-14-2012 Thats great Atom thanks ! I am starting a blogpost on maskprocessor in view of the incremental bruteforce capabilities to follow up on a previous post I did on wpa + oclhashcat . Hadn't yet started on looking closely at rule making, but that will be my next endeavour From a quick test it does seem to do exactly what I wanted, thanks for your quick help ! |