Rule generation vs Attack Method?
#2
see princeprocessor (pp) for combinung up to X words from a given list, use pp to feed hashcat over pipe (there is a nice overview in the second link)

https://github.com/hashcat/princeprocessor
https://reusablesec.blogspot.com/2014/12...rince.html

rules dont "generate" passwords but modify them, next thing yes, you will gain no boost in hashrate when doing rules on cpu but this doesnt matter in an older thread i tried different attacks, combinator, dict + rules and bf with scrypt, result was always the same speed

to check your attack use --stdout before like this
pw.txt
Code:
a
b
c
1
2
3
and a rule.txt with just T0 inside (toogle first char)
Code:
pp64.exe --elem-cnt-min=3 --elem-cnt-max=3 < pw.txt | hashcat.exe --stdout -r rule.txt
this will result in output like this (shortened), these are your generated passwords, 3 elements (min,max) and with first char toggled

Code:
Ca3
1a3
2a3
3a3
Ab3
Bb3
Cb3
1b3
2b3
3b3
Ac3
Bc3
Cc3
1c3
2c3
3c3
A13
B13
Reply


Messages In This Thread
Rule generation vs Attack Method? - by secondpass - 08-12-2022, 10:01 AM
RE: Rule generation vs Attack Method? - by Snoopy - 08-12-2022, 10:25 AM