05-07-2021, 04:06 PM
(05-06-2021, 11:48 AM)randomguy7894 Wrote: Also, I will try to set up a better rules, because I have notice dive.rule tests too many possibilities. In my PSN.txt I have put some fragment, for example ["password", "10", "="] and I would like hashcat to test a combinaison of those elements and some little modification for password. For examples:
10password!
!passw0rd
P4ssw0rd10!
And not
password69
wordpass?
Like dive.rule is currently doing.
Do you have a preset rules that could match my needs?
Hello, I am a newbie trying to do the same thing as you. So take with a grain of salt what I am saying. Maybe the hashcat-util program pp64 doing a Prince attack with combinations of multiples words can do your trick. Tell me it helps, I have no tried it yet.
Also I find rules complicated too, I tend to try short wordlists with my old CPU. So in your example, I would build a list of common permutation on password called combileft.txt , then merge (combinatory attack) with another key string of character like 10 in your example called combiright.txt and finally use the simple rule to add one character at the beginning or the end -j '&!' or - k '&!'
./hashcat -m 15700 -w 2 -a 1 wallethash.txt combileft.txt combiright.txt -j '&!' for example
if you want to see the words tested try
hashcat --stdout -a 1combileft.txt combiright.txt -j '&!'
The falw in this is that it has not all the possible permutations in "password" for example
Hope it helps