03-06-2017, 08:53 AM
Maskprocessor has a command line argument for exactly this type of password candidate filtering:
https://github.com/hashcat/maskprocessor...c/mp.c#L78
So one could use something like this:
Note: as royce already pointed out, it may or not may sense speedwise, depending on the mask, hash type (can we generalize it to say only "slow hashes" should be run like this!?), your hardware (especially vendor/model and amount of GPUs) etc
But the good thing is, you can just test it and see if it is faster or not for you.
https://github.com/hashcat/maskprocessor...c/mp.c#L78
So one could use something like this:
Code:
./mp64.bin -q 2 ?d?d?d?d?d?d?d?d | ./hashcat -a 0 -m 2500 networks_2018.hccapx
Note: as royce already pointed out, it may or not may sense speedwise, depending on the mask, hash type (can we generalize it to say only "slow hashes" should be run like this!?), your hardware (especially vendor/model and amount of GPUs) etc
But the good thing is, you can just test it and see if it is faster or not for you.