![]() |
hashcat-4.0.1 mask - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: hashcat-4.0.1 mask (/thread-9821.html) |
hashcat-4.0.1 mask - testerro2 - 01-26-2021 Hi, I have read https://hashcat.net/wiki/doku.php?id=mask_attack I'm using hashcat-4.0.1 hashcat64.exe -m 2500 -a 3 --increment --increment-min 8 --increment-max 8 xxx.hccapx -1 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ ?1?1?1?1?1?1?1?1 with 2 RX570 cards its about (22 years, 336 days) !!! the password is always 8 characters long, but I trust they are always there 3 capital letters 3 lowercase letters 2 digits is it possible to narrow the method down to the above findings what tools to use, or rules can do it? thank you in advance for the hint, tips, Regards, Tadziu RE: hashcat-4.0.1 mask - hblender - 01-26-2021 use rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack or write your own script the increment parameter is useless if you specify the custom charset, also there is no need to put all the chacacters (0-9, a-z, A-Z), you can use -1 ?l?u?d ?1?1?1?1?1?1?1?1 RE: hashcat-4.0.1 mask - testerro2 - 01-26-2021 (01-26-2021, 02:57 PM)hblender Wrote: use rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack or write your own script we don't understand each other, yours will test all the possibilities again I want to narrow it down to the following rules where an 8 character password always consists of 3 lowercase letters 3 capital letters 2 digits I narrowed it down as below hashcat64.exe -m 2500 -a 3 --increment --increment-min 8 --increment-max 8 xxxx.hccapx -1 0123456789 -2 ABCDEFGHIJKLMNOPQRSTUVWXYZ -3 abcdefghijklmnopqrstuvwxyz ?1?2?3?3?2?3?1?2 how to mix all the possibilities of these [?1?2?3?3?2?3?1?2] rules thank you in advance RE: hashcat-4.0.1 mask - royce - 01-27-2021 Not related to your question, but also note that hashcat 4.x is quite outdated, and you might consider testing latest stable (6.1.1) to avoid bugs, better performance, etc etc. |