Masked attack ? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Masked attack ? (/thread-9566.html) |
Masked attack ? - NotThisMind - 10-15-2020 Hello, Consider this scenario: Password between 8-14 characters. I know the first 3 letters exact, i know there's only uppercase TL (exact) in it, it may be TLLT LTTL or just TL/LT, i know there's only the numbers 3, 7 ,1 in use (after the letters) i just don't know the exact combination. Can someone help me think of a way to better convert this process into hashcat if possible? I basically know the whole password, i just can't find the right combination. Sorry, i'm kind of a newb, i'm getting an hash from a .7z file encrypted with AES. RE: Masked attack ? - slyexe - 10-16-2020 use custom charsets for example: Known TL within password & 371 Define the custom charsets using -1 thru to -4 -1 TL371 Create your mask attack with increment upto 14 from 8 Add in your known 3 letters at the start (ABC in this example) hashcat -a 0 -m (hashtype) -i --increment-min 8 --increment-max 14 hashfile.txt ABC?1?1?1?1?1?1?1?1?1?1?1 |