03-30-2015, 06:49 PM
I know what you want to do but there is no completely straight forward method in achieving this as of now.
For that one example attack you posted I personally would probably go by undeath's method and generate every possible mask. However you can also take a look at statsprocessor. The default chain hashcat.hcstat which is derived from rockyou should give you like 70-80% of what you want. The benefit of this method is that your attack doesn't stop when the masks are exhausted, they just go all the way till the keyspace is exhausted if you so wish. Depending on your "mask" you might cook up a special hcstat to push your desired candidates to the top.
For that one example attack you posted I personally would probably go by undeath's method and generate every possible mask. However you can also take a look at statsprocessor. The default chain hashcat.hcstat which is derived from rockyou should give you like 70-80% of what you want. The benefit of this method is that your attack doesn't stop when the masks are exhausted, they just go all the way till the keyspace is exhausted if you so wish. Depending on your "mask" you might cook up a special hcstat to push your desired candidates to the top.
sch0.org