as i said, the logic to decline such pw candidates would slow down more than just checking this pw
sry for my mistake, mask and rules is not supported (at least direcly), you have to cirmumvent this by generating your wordlist beforehand, or feed hahscat with maskprocessor
my try would be using maskprocessor
you can use maskprocesser with just ?l?l?l?l?l?l?l to generate words with just 7 letters lowercase, feed this via pipe to hashcat and you can use a rule file
for basic understanding you can tryout this with a simple test like this
put 32 times the char a into hash.txt (emulating a simple md5)
put $1 into a file called rule.txt (basic rule just append 1 to the password)
fire up this command line (between mask and hahscat, this is a pipe)
mp64 ?l?l?l | hashcat -a 0 -m 0 -O -r rule.txt hash.txt
this should run very fast, just see the line with candidates
Candidates.#1....: yge1 -> zzz1
as you can see, the piped pw candidates where modified on the fly and a 1 was appended, so rukles are working
or you can just fire
mp64 ?l?l?l | hashcat -a 0 -m 0 -O -r rule.txt --stdout
to see the generated passwords
...
zzm1
zzn1
zzo1
zzp1
zzq1
zzr1
zzs1
zzt1
zzu1
zzv1
zzw1
zzx1
zzy1
zzz1
"all" you have to do now ist just lengthen the mask (at least to 6 or 7 times ?l (depending on which kind of rules you want to use) and build a specialruleset for inserting/switching posistions with upper, numbers, what you want, but this is a quite nice task, because you have to do this for all position from 0-6 (counter starts at 0 ) and for all kind of rules you want
you can see hashcat wiki https://hashcat.net/wiki/doku.php?id=rul...kprocessor how to use the maskprocessor to help you generating the rules and use combinator to combine this rules
sry for my mistake, mask and rules is not supported (at least direcly), you have to cirmumvent this by generating your wordlist beforehand, or feed hahscat with maskprocessor
my try would be using maskprocessor
you can use maskprocesser with just ?l?l?l?l?l?l?l to generate words with just 7 letters lowercase, feed this via pipe to hashcat and you can use a rule file
for basic understanding you can tryout this with a simple test like this
put 32 times the char a into hash.txt (emulating a simple md5)
put $1 into a file called rule.txt (basic rule just append 1 to the password)
fire up this command line (between mask and hahscat, this is a pipe)
mp64 ?l?l?l | hashcat -a 0 -m 0 -O -r rule.txt hash.txt
this should run very fast, just see the line with candidates
Candidates.#1....: yge1 -> zzz1
as you can see, the piped pw candidates where modified on the fly and a 1 was appended, so rukles are working
or you can just fire
mp64 ?l?l?l | hashcat -a 0 -m 0 -O -r rule.txt --stdout
to see the generated passwords
...
zzm1
zzn1
zzo1
zzp1
zzq1
zzr1
zzs1
zzt1
zzu1
zzv1
zzw1
zzx1
zzy1
zzz1
"all" you have to do now ist just lengthen the mask (at least to 6 or 7 times ?l (depending on which kind of rules you want to use) and build a specialruleset for inserting/switching posistions with upper, numbers, what you want, but this is a quite nice task, because you have to do this for all position from 0-6 (counter starts at 0 ) and for all kind of rules you want
you can see hashcat wiki https://hashcat.net/wiki/doku.php?id=rul...kprocessor how to use the maskprocessor to help you generating the rules and use combinator to combine this rules