Help performing a mask-attack on 1 MD5
#2
you should have a look here:
https://hashcat.net/wiki/doku.php?id=mask_attack

especially the .hcmask file section could be interesting too:
https://hashcat.net/wiki/doku.php?id=mas...mask_files

you could also use the mask files shipped with hashcat, because they are quite good (of course) and apply some filter to it:
Code:
grep '^?u' masks/rockyou-7-2592000.hcmask | grep '?s$' | grep -v '?s?' | awk 'length > 15' | awk 'length < 29'

btw: your policy is kind of contradicting with your examples, you said "ends with special characters" but your example is "Support@123" which ends with numbers.

I would also suggest checking out policygen.py of the 3rd party tool PACK: http://thesprawl.org/projects/pack/#policygen
(which is able to generate the .hcmask files automatically for you, depending on your policies/rules)

you should then run hashcat like this:
Code:
hashcat -m 0 -a 3 -w 3 -O hashes.txt mask_file.hcmask


Messages In This Thread
Help performing a mask-attack on 1 MD5 - by assem - 12-27-2018, 06:10 AM
RE: Help performing a mask-attack on 1 MD5 - by philsmd - 12-27-2018, 10:45 AM