Rules in 16800 don't work? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: Rules in 16800 don't work? (/thread-9348.html) |
Rules in 16800 don't work? - FinPeter - 06-30-2020 This is strange, is there a bug or am I missing something here: Let's say password is WORD123. I have following files: test.hash containing single hash (16800) of the password test.rule containing single line: $1$2$3 word.dict containing single line: WORD word123.dict containing single line: WORD123 This is odd: hashcat -a 0 -m 16800 test.hash word123.dict works as expected and cracks the password almost immediately. However hashcat -a 0 -m 16800 test.hash word.dict -r test.rule gives me "Exhausted". Single line rule works, because hashcat -a 0 word.dict -r test.rule --stdout gives me WORD123 as expected. Also, same password in SHA-1 and Office 2013 hashes works as expected. I'm using Hashcat 5.1.0 in Windows and 1080 GPU. RE: Rules in 16800 don't work? - undeath - 06-30-2020 I expect your password is not actually WORD123 but something different. Because WORD123 is only seven characters and thus not a valid WPA2 password. WPA2 has a minimum password length of eight characters and unfortunately hashcat early-rejects words from your wordlist below that threshold before applying rules. You can verify this by checking the "rejected" metric of your hashcat output. RE: Rules in 16800 don't work? - atom - 06-30-2020 instead of using: Code: hashcat -a 0 -m 16800 test.hash word.dict -r test.rule you can also use: Code: hashcat -a 0 -m 16800 test.hash word.dict -r test.rule -S RE: Rules in 16800 don't work? - FinPeter - 06-30-2020 (06-30-2020, 10:07 AM)undeath Wrote: I expect your password is not actually WORD123 but something different. Because WORD123 is only seven characters and thus not a valid WPA2 password. Yep, WORD was just an example, the actual password is 5 chars + 123, total 8 chars. RE: Rules in 16800 don't work? - FinPeter - 06-30-2020 (06-30-2020, 10:16 AM)atom Wrote: instead of using: WOW - it works, thanks! -S means "enable slower (but advanced) candidate generators" ?? No idea, what it means (because the rule couldn't be any simpler), but it works. Without your help I would have never found this. RE: Rules in 16800 don't work? - philsmd - 06-30-2020 it's exactly like undeath explained above. Without the -S slow mode the passwords that are too short (from the dict) are rejected immediately, while the -S mode is slow because it mangles the words with rules already on the host (CPU). This is just a speed tradeoff, a design decision. A known limitation RE: Rules in 16800 don't work? - FinPeter - 06-30-2020 (06-30-2020, 11:10 AM)philsmd Wrote: it's exactly like undeath explained above. Do I understand this correctly: you need to use -S only if dictionary contains words which are shorter than 8 characters before any rules are applied? Then it makes sense. If dictionary has both short (<8) and long (8 or more chars) words, are rules applied correctly to longer words even without -S? RE: Rules in 16800 don't work? - undeath - 06-30-2020 Yes, without using -S words from your wordlist shorter than eight bytes will be rejected. RE: Rules in 16800 don't work? - blacktraffic - 07-01-2020 (06-30-2020, 11:10 AM)philsmd Wrote: it's exactly like undeath explained above. Wow; I really should have known that given how long I have been messing around with hashcat, and I did not. I do now - thank you very much! |