11-19-2013, 07:36 PM
yes you could do this.
just start by doing a standard mask attack against the hash. if you don't want to see what the input was, just use -o /dev/null --disable-potfile and hashcat will simply print a message saying it cracked the hash without telling you what the input was, and exit with the appropriate return code.
you could use maskprocessor to pre-compute this; however, you wouldn't want to actually do this, because for one it will likely require a massive amount of disk space, and second, on-gpu candidate generation is several orders of magnitude faster than running through a straight wordlist.
just start by doing a standard mask attack against the hash. if you don't want to see what the input was, just use -o /dev/null --disable-potfile and hashcat will simply print a message saying it cracked the hash without telling you what the input was, and exit with the appropriate return code.
you could use maskprocessor to pre-compute this; however, you wouldn't want to actually do this, because for one it will likely require a massive amount of disk space, and second, on-gpu candidate generation is several orders of magnitude faster than running through a straight wordlist.