Help with specific password scheme
#2
A hybrid attack might be fine. If you generate the wordlist on the fly, no need to store it anywhere. I'd do it with everything but the first four digits prepended and then pipe the output of that script into hashcat, running in hybrid mask+wordlist attack with -a 7 ?d?d?d?d.

You could also emulate either that, or other parts of the attack, with rules. Running more rules on GPU is good for speed.

in the ./rules/ directory, there are rulesets called 'prepend_d.rule' and 'append_d.rule'. You could basically add this four times (-r prepend_d.rule -r prepend_d.rule -r prepend_d.rule -r prepend_d.rule -r append_d.rule) to the attack. But that might not be enough to fully utilize your GPUs if it's a fast hash.

Depending on the size of the English dictionary, and the speed of your hash, it might be efficient to generate rules for the last part (english word + 1 digit), so that each rule is of the form

Code:
^w ^o ^r ^d ^0
^w ^o ^r ^d ^1
^w ^o ^r ^d ^2

etc

A 60,000-word dictionary + a single digit would be 600,000 rules, which might or might not fit on your target platform. If it will fit, it should supply a lot of work to the GPUs, even for faster hashes.

You can also mix - some rules applied with your script, and some applied with hashcatThe more you can run as rules the better, but you might have to tinker with it to see what works best for your target platform.

If it was me, I'd probably try the prepend_d.rule x 4 and append_d.rule first to see if they fully utilize your GPU(s). If so, there's no need to get fancier.
~
Reply


Messages In This Thread
Help with specific password scheme - by FrostByte - 04-01-2019, 09:49 AM
RE: Help with specific password scheme - by royce - 04-01-2019, 04:48 PM
RE: Help with specific password scheme - by royce - 04-02-2019, 04:06 AM