02-23-2015, 07:59 PM
(02-23-2015, 07:02 PM)Atticuss Wrote: I've also run through all the tutorials and it's become very apparent that rule tuning skill means tons more than hardware available. I can't seem to find any tutorials walking through the thought process of generating passwords from sets of known plaintexts. Any links or references in regards to that would be greatly appreciated.
You want PACK, which can be found here. A word of warning: If you feed PACK something that's too big, it will fall over at the point in the script where it sorts the rules by popularity. In that case, "sort [old-file] | uniq -c | sort -rnk1 > [new-file]" is your friend. For reference, I fed it a 15GB file that contained nothing but rules and it died.
Something else you're going to want to know: Rolling your own rule sets (At least in my testing) has been hit or miss compared to using the stock rules that come with hashcat, and doesn't start becoming compelling (On a rule-by-rule comparison) until you start using over 6,000 rules or so.