12-30-2014, 07:01 AM
(12-30-2014, 06:35 AM)rsberzerker Wrote: The leaving of duplicates, is that for the "generate an hcstat file" list, the attack list, or both?
The context was around generating an hcstat file. Duplicates in your wordlist makes no sense.
(12-30-2014, 06:35 AM)rsberzerker Wrote: As for the <6 characters, I'm on the fence about that. For instance, I've been practicing on the mayhem list. I've found several passwords, including:
It's your call. It really just comes down to how you typically attack hashes, and I'm trying to give generic advice. Personally I would typically pick up those types of passwords with a mask attack.