first if you intend to use bruteforce you didnt need the rule for reversing, because never the less bruteforce will generate both, password and reversed password, so there is no need for reversing
do you believe the passwords are randomly generated or do you think there are "mainstream pw"?
what about he static word? if you know it i would use prepend append rule for this, in your case
you can test this as following
testdic
rule
hashcat
output
as you can see, you have to reverse your prepend becaus the rules are read and worked left to right so to "read" prepend you have to use
rule
you can modify this to get your fixed words, you can test with --stdout to see if it works like you intended
there is also the possiblity to use 3 wordlists and combine them to get the same behavior, but if you want to use a realword wordlist (without reversing them beforehand) i think the rule approach is better and maybe al little bit faster
do you believe the passwords are randomly generated or do you think there are "mainstream pw"?
what about he static word? if you know it i would use prepend append rule for this, in your case
you can test this as following
testdic
Code:
12345
Password
Code:
r $a$p$p$e$n$d ^p^r^e^p^e^n^d
Code:
hashcat --stdout -r rule testdic
output
Code:
dneperp54321append
dneperpdrowssaPappend
as you can see, you have to reverse your prepend becaus the rules are read and worked left to right so to "read" prepend you have to use
rule
Code:
r $a$p$p$e$n$d ^d^n^e^p^e^r^p
you can modify this to get your fixed words, you can test with --stdout to see if it works like you intended
there is also the possiblity to use 3 wordlists and combine them to get the same behavior, but if you want to use a realword wordlist (without reversing them beforehand) i think the rule approach is better and maybe al little bit faster