Rules File - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Rules File (/thread-9868.html) |
Rules File - UKLondon2025 - 02-10-2021 Hi All I hope everybody is safe and well? I have a question on brute force password finding. I know that: hashcat.exe -m 1000 -a 0 --potfile-disable -r dive.rule hashes.txt dictionary.dic Can be used to recover a password via key words. Is there a rule that can be used without the dictionary file to revoer a password of uptp 10 characters that may have letters, numbers and special characters? Regards RE: Rules File - Snoopy - 02-10-2021 (02-10-2021, 02:11 PM)UKLondon2025 Wrote: Hi All see, https://hashcat.net/wiki/doku.php?id=mask_attack more or less a bruteforce attack using a mask ?a?a?a?a?a?a?a?a?a?a with increment-option RE: Rules File - UKLondon2025 - 02-10-2021 Thankyou. (02-10-2021, 04:48 PM)Snoopy Wrote:(02-10-2021, 02:11 PM)UKLondon2025 Wrote: Hi All |