02-13-2018, 10:15 AM
for points 1 to 3 you could use maskprocessor. It supports the -q and -r command line arguments that filter out exactly the password candidates that do not match the policy that you described above.
For #4 you probably would need to create a custom script, because I do not think this is supported by those tools (this feature would probably need to be very flexible and would need to allow substrings of custom length, not only length 2 substrings).
For #1-#3 you could just pipe maskprocessor to hashcat.
mp64 -q 3 -r 3 ?u?u?u?u?u?u?u?u | hashcat -m 2500 a.hccapx
For #4 you probably would need to create a custom script, because I do not think this is supported by those tools (this feature would probably need to be very flexible and would need to allow substrings of custom length, not only length 2 substrings).
For #1-#3 you could just pipe maskprocessor to hashcat.
mp64 -q 3 -r 3 ?u?u?u?u?u?u?u?u | hashcat -m 2500 a.hccapx