rules file support in attack mode 3
#4
If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password candidates to a dictionary file and use the dictionary and the duplicate rule in hashcat.

e.g.
Code:
hashcat --stdout -a 3 ?d?d?d?d > dict.txt
(or use maskprocessor instead)

and
Code:
hashcat -m 0 -w 4 -r duplicate.rule hash.txt dict.txt
where the file duplicate.rule contains the duplicate rule (d)


Messages In This Thread
RE: rules file support in attack mode 3 - by atom - 02-13-2018, 10:39 AM
RE: rules file support in attack mode 3 - by philsmd - 02-15-2018, 10:30 AM