02-13-2018, 11:21 AM
(02-13-2018, 10:15 AM)philsmd Wrote: for points 1 to 3 you could use maskprocessor. It supports the -q and -r command line arguments that filter out exactly the password candidates that do not match the policy that you described above.
For #4 you probably would need to create a custom script, because I do not think this is supported by those tools (this feature would probably need to be very flexible and would need to allow substrings of custom length, not only length 2 substrings).
For #1-#3 you could just pipe maskprocessor to hashcat.
mp64 -q 3 -r 3 ?u?u?u?u?u?u?u?u | hashcat -m 2500 a.hccapx
Hi,
Thank you for your answer.
How to make the script you talk about?
And finaly, it worth the time to make this script and i whant to know if the cracking time will be really decreased or not. Thank you !
Ps: i use hashcat on windows for the moment, i breaked an The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) installation when i tried to install cuda driver. the command line you gave is correct for windows?
Thank you again and have a nice day !