(11-16-2018, 10:10 AM)Nay Wrote: Hi,
You may want to try Prince Processor : https://hashcat.net/wiki/doku.php?id=princeprocessor
The --pw-min/max lelt you choose the min/max length of the output. You can also use --elem-cnt-min and --elem-cnt-max and put them to X to use only a combinator of X wordsCode:./pp64 --pw-min=5 --pw-max=5 < wordlist.txt | hashcat -m 0 -a 0 hash_list.txt --outfile results.txt -r AnyRuleYouWantToAdd.rule
try ./pp64 --help for more help
Thank you sir.
I understand from some changlog documentation from hashcat that prince is not integrated into hashcat as attack mode 6 and 7 is that right? I have experimented with these modes but failed to find the password associated with my test hash.
This is the command I'm trying:
Code:
hashcat64.exe -a 6 -m 13000 -w 3 target-hash.txt pw-list.txt ?d
Reading more about -a 6 it appears that it combines a word list with a mask however in my case I don't care about the mask - instead as mentioned in my first post - I only care about trying all possible combinations of words in a wordlist. Is there a way not to specify a mask with attack mode 6 or should I use prince processor directly as you advised?
Thanks in advance.