hashcat Forum
hashcat built in prince attack no longer working with -a 6 or -a 8 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: hashcat built in prince attack no longer working with -a 6 or -a 8 (/thread-9793.html)



hashcat built in prince attack no longer working with -a 6 or -a 8 - jaguar - 01-18-2021

hi , what is the full prince command in the new hashcat? i tried -a6 and -a8 but neither are working. Im trying to crack 3 word passwords. I saw an old post about using a similar command to this
hashcat -a 6 --stdout  --pw-max=20 --elem-cnt-min=3 --elem-cnt-max=3 english3.txt target_hashes.txt -o cracked.txt

but it says --elem-cnt-max=3 is invalid


also i tried pp64 with pipe in hashcat but pipe is too slow

i also have a working workaround which involves merging 2 wordlists into one output, then using a combinator attack on that new wordlist. However that involves creating a 650gb wordlist on my hard drive. So im hoping to get the built in prince attack working and hope it will allow using GPUs since its a hashcat command with -D 1,2 


reference
https://hashcat.net/forum/thread-4409.html?highlight=prince


RE: hashcat built in prince attack no longer working with -a 6 or -a 8 - undeath - 01-18-2021

There is no built-in prince attack and never has been.


RE: hashcat built in prince attack no longer working with -a 6 or -a 8 - jaguar - 01-18-2021

(01-18-2021, 07:34 PM)undeath Wrote: There is no built-in prince attack and never has been.

then what was the admin talking about in this thread?
https://hashcat.net/forum/thread-4409.html?highlight=prince