12-17-2012, 10:10 PM
It wasn't officially, properly documented or explained but:
Tables used in Table Look-up attacks has a slightly changed format since -0.41, see below:
CHAR=STR
Where CHAR is a single character, and STR is the desired substitute, note that it can be a single character, too, or it can be a whole string, including wide characters.
So, to have your hash cracked use the following table:
Yes, you do have to repeat the char if you want to have multiple substitutions.
Tables used in Table Look-up attacks has a slightly changed format since -0.41, see below:
CHAR=STR
Where CHAR is a single character, and STR is the desired substitute, note that it can be a single character, too, or it can be a whole string, including wide characters.
So, to have your hash cracked use the following table:
Code:
a=a
a=A
a=4
a=@
a=/\
a=æ
...