06-16-2022, 04:05 PM
you are welcome, just a small addition to marc1ns answer
@marcin (NEVER user --force)
you didnt need to generate wordllists like this beforehand as hashcat can apply rules directly on the fly, just add -r and the rules.file and your wordlist
yeah -o tells please put output in cracked.txt, second, you could also have openend hashcat.potfile because this is the file where your cracked hash:pw are stored by default
@marcin (NEVER user --force)
Code:
hashcat --force --stdout your_pass_list.txt -r rules/dive.rule > output_pass_list.txt
you didnt need to generate wordllists like this beforehand as hashcat can apply rules directly on the fly, just add -r and the rules.file and your wordlist
Code:
hashcat -a0 -m14700 -o cracked.txt --outfile-format=2 -r rules/dive.rule manifest931.txt attack.txt
yeah -o tells please put output in cracked.txt, second, you could also have openend hashcat.potfile because this is the file where your cracked hash:pw are stored by default