Avoid character occurrance in brute force attack
#5
(03-06-2017, 08:53 AM)philsmd Wrote: Maskprocessor has a command line argument for exactly this type of password candidate filtering:
https://github.com/hashcat/maskprocessor...c/mp.c#L78

So one could use something like this:
Code:
./mp64.bin -q 2 ?d?d?d?d?d?d?d?d | ./hashcat -a 0 -m 2500 networks_2018.hccapx

Note: as royce already pointed out, it may or not may sense speedwise, depending on the mask, hash type (can we generalize it to say only "slow hashes" should be run like this!?), your hardware (especially vendor/model and amount of GPUs) etc
But the good thing is, you can just test it and see if it is faster or not for you.
Thanks!.... I've tried your command but I got some errors :
WARNING: Hash 'capture.hccapx' : Invalid eapol size

ERROR: No hashes loaded

Any idea?


Messages In This Thread
RE: Avoid character occurrance in brute force attack - by itanon - 03-07-2017, 02:22 AM