you should have a look here:
https://hashcat.net/wiki/doku.php?id=mask_attack
especially the .hcmask file section could be interesting too:
https://hashcat.net/wiki/doku.php?id=mas...mask_files
you could also use the mask files shipped with hashcat, because they are quite good (of course) and apply some filter to it:
btw: your policy is kind of contradicting with your examples, you said "ends with special characters" but your example is "Support@123" which ends with numbers.
I would also suggest checking out policygen.py of the 3rd party tool PACK: http://thesprawl.org/projects/pack/#policygen
(which is able to generate the .hcmask files automatically for you, depending on your policies/rules)
you should then run hashcat like this:
https://hashcat.net/wiki/doku.php?id=mask_attack
especially the .hcmask file section could be interesting too:
https://hashcat.net/wiki/doku.php?id=mas...mask_files
you could also use the mask files shipped with hashcat, because they are quite good (of course) and apply some filter to it:
Code:
grep '^?u' masks/rockyou-7-2592000.hcmask | grep '?s$' | grep -v '?s?' | awk 'length > 15' | awk 'length < 29'
btw: your policy is kind of contradicting with your examples, you said "ends with special characters" but your example is "Support@123" which ends with numbers.
I would also suggest checking out policygen.py of the 3rd party tool PACK: http://thesprawl.org/projects/pack/#policygen
(which is able to generate the .hcmask files automatically for you, depending on your policies/rules)
you should then run hashcat like this:
Code:
hashcat -m 0 -a 3 -w 3 -O hashes.txt mask_file.hcmask