04-16-2018, 12:29 AM
hey man, not an expert but maybe this will help:
it sounds like you know some of the password, and have come up with some variations that cover most cases and you now also need to tack on a couple digits? (you said with different last two digits, which may also refer to the -m switch, correct me if I'm wrong)
If so, what you want is a hybrid attack with a mask. This basically takes a left or right hand side and appends a mask (mask being a group of characters to combine in all possible combinations).
`hashcat64.exe -m XXXXX -a 7 yourhash.dd test.dict ?a?a`
this command would append two characters of any type to each entry in the dictionary (I believe). You can look up hybrid + mask attacks in the docs for more details.
Another alternative, if you know the basic 30 characters but not all the variations you may have used (3 for e etc), then consider looking at the LeetSpeak rule. This does exactly that to a wordlist, substituting characters for their variants (l for 1 etc).
Good luck!
it sounds like you know some of the password, and have come up with some variations that cover most cases and you now also need to tack on a couple digits? (you said with different last two digits, which may also refer to the -m switch, correct me if I'm wrong)
If so, what you want is a hybrid attack with a mask. This basically takes a left or right hand side and appends a mask (mask being a group of characters to combine in all possible combinations).
`hashcat64.exe -m XXXXX -a 7 yourhash.dd test.dict ?a?a`
this command would append two characters of any type to each entry in the dictionary (I believe). You can look up hybrid + mask attacks in the docs for more details.
Another alternative, if you know the basic 30 characters but not all the variations you may have used (3 for e etc), then consider looking at the LeetSpeak rule. This does exactly that to a wordlist, substituting characters for their variants (l for 1 etc).
Good luck!