hashcat Forum
maskprocessor -- reversing increments - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip (https://hashcat.net/forum/forum-28.html)
+--- Thread: maskprocessor -- reversing increments (/thread-923.html)

maskprocessor -- reversing increments - TAPE - 02-14-2012

Hey all, I have been playing around with maskprocessor emulating bruteforce and was wondering whether
it is possible to reverse the incrementation.

I'll try to explain what I am trying as best as possible ;

If we know that the first 4 characters of an 8-10 character WPA passphrase are 'abcd' followed by
lower alpha characters then you would be able to start maskprocessor with increments as follows ;
mp64.exe -i --increment-min=8 abcd?l?l?l?l?l?l
result: abcdaaaa -- abcdzzzzzz

If on the other hand you know that the last 4 characters are for instance 'wxyz' is there a way to have the
first characters increment from 4 to 6 characters or is manual the only way to go ?

mp64.exe -i --increment-min=8 ?l?l?l?l?l?lwxyz
of course starts by taking the first 8 characters which excludes the last 2 characters of what I would want fixed.

I am not sure if this is even possible, but I am a complete newb with maskprocessor,
so any guidance from the pros much appreciated !

RE: maskprocessor -- reversing increments - atom - 02-14-2012

Why not using a rule? Something like this should work:

echo $w$x$y$z > rule

mp64 -i ?l?l?l?l?l?l | oclHashcat-plus64 -r rule -m 2500 ...

RE: maskprocessor -- reversing increments - TAPE - 02-14-2012

Thats great Atom thanks !

I am starting a blogpost on maskprocessor in view of the incremental bruteforce capabilities to follow
up on a previous post I did on wpa + oclhashcat .
Hadn't yet started on looking closely at rule making, but that will be my next endeavour Wink

From a quick test it does seem to do exactly what I wanted, thanks for your quick help !