05-04-2014, 10:29 PM
(This post was last modified: 05-05-2014, 11:32 PM by Kgx Pnqvhm.)
Looking back at Yiannis' doctoral paper, to see what was there, in case the slides from his Bsides talk become available (my question in another post), I saw that the Appendix 5 morph.pl is the same as the hashcat-utils topmorph.pl, which has the same usage as morph.exe, and is used for " dynamic rule generation".
tmesis.pl is called necromorph internally, was "inspired by T0XlC" (the author noted above), and seems to do something like his provided rules:
T0XlC-insert_00-99_1950-2050_toprules_0_F.rule
T0XlC-insert_space_and_special_0_F.rule
T0XlC-insert_top_100_passwords_1_G.rule
I wonder if his talk showed how to use these tools in some sort of a workflow.
tmesis.pl is called necromorph internally, was "inspired by T0XlC" (the author noted above), and seems to do something like his provided rules:
T0XlC-insert_00-99_1950-2050_toprules_0_F.rule
T0XlC-insert_space_and_special_0_F.rule
T0XlC-insert_top_100_passwords_1_G.rule
I wonder if his talk showed how to use these tools in some sort of a workflow.