04-28-2021, 04:02 PM
put these into a file called list.list
test
word
admin
root
superdupapass
and run
hashcat --stdout -a 6 list.list ?d
as you can see hahscat prints all of the above candidates with one digit [0-9] APPENDED
run hashcat --stdout -a 7 ?d list.list for PREPENDED
you can use redirection >> to output this into another file
so running these 2
hashcat --stdout -a 6 list.list ?d >> list2.list
hashcat --stdout -a 7 ?d list.list >> list2.list
will give you a list2.list with all pws from list.list appended and prepended with a single number from [0-9]
so all you have to do is prepare your list.list and upgrade/update this simple mask ?d with a more suitable for your case
be aware, depending an your list and mask (if you use something like increment and or a long mask) u will need plenty of storage for your generated list)
OR you can feed hahscat directly with these generated pw candidates but then you have to do multiple runs due to the fact that your attackvektor is quite special and generating all rules to achieve appending and prepending in one run will also take some time
to achieve more complex things like you mentioned with 2 words you can use hahscat utils combinator
.\combinator.exe .\list.list .\list.list
will output all words from list.list combined with eachother so
testtest
testword
... and so on
test
word
admin
root
superdupapass
and run
hashcat --stdout -a 6 list.list ?d
as you can see hahscat prints all of the above candidates with one digit [0-9] APPENDED
run hashcat --stdout -a 7 ?d list.list for PREPENDED
you can use redirection >> to output this into another file
so running these 2
hashcat --stdout -a 6 list.list ?d >> list2.list
hashcat --stdout -a 7 ?d list.list >> list2.list
will give you a list2.list with all pws from list.list appended and prepended with a single number from [0-9]
so all you have to do is prepare your list.list and upgrade/update this simple mask ?d with a more suitable for your case
be aware, depending an your list and mask (if you use something like increment and or a long mask) u will need plenty of storage for your generated list)
OR you can feed hahscat directly with these generated pw candidates but then you have to do multiple runs due to the fact that your attackvektor is quite special and generating all rules to achieve appending and prepending in one run will also take some time
to achieve more complex things like you mentioned with 2 words you can use hahscat utils combinator
.\combinator.exe .\list.list .\list.list
will output all words from list.list combined with eachother so
testtest
testword
... and so on