11-16-2017, 10:09 AM
one approach could be to create multiple rules (see https://hashcat.net/wiki/?id=rule_based_attack) each one of those rules prepends one single/different character (and does the other manipilation to the word that you intend to do) and duplicate the word x times.
Examples:
It's no problem to use several different rules to generate all your password candidates and to cover all the keyspace.
Since you seem to need to use rules anyways (because you want to do some capitalization etc), this would be the most straightforward approach.
You could even use (if needed) the multi-rule feature of hashcat (see https://hashcat.net/wiki/?id=rule_based_...ulti-rules) that allows you to do the first manipulation of the word (e.g. capitalization) in one rule file and add a second "-r" parameter that does the prepend and duplicate/multiplicate rules, e.g.:
-r first_manipulation.rule -r prepend_duplicate.rule
BTW: you could also use maskprocessor to generate the prepend rules, e.g.
mp64 "?a p2" > prepend_duplicate.rule
Examples:
Code:
^a p2
^b p2
^c p2
...
^z p2
^A p2
^B p2
^C p2
...
^Z p2
^0 p2
...
It's no problem to use several different rules to generate all your password candidates and to cover all the keyspace.
Since you seem to need to use rules anyways (because you want to do some capitalization etc), this would be the most straightforward approach.
You could even use (if needed) the multi-rule feature of hashcat (see https://hashcat.net/wiki/?id=rule_based_...ulti-rules) that allows you to do the first manipulation of the word (e.g. capitalization) in one rule file and add a second "-r" parameter that does the prepend and duplicate/multiplicate rules, e.g.:
-r first_manipulation.rule -r prepend_duplicate.rule
BTW: you could also use maskprocessor to generate the prepend rules, e.g.
mp64 "?a p2" > prepend_duplicate.rule