08-12-2022, 10:25 AM
see princeprocessor (pp) for combinung up to X words from a given list, use pp to feed hashcat over pipe (there is a nice overview in the second link)
https://github.com/hashcat/princeprocessor
https://reusablesec.blogspot.com/2014/12...rince.html
rules dont "generate" passwords but modify them, next thing yes, you will gain no boost in hashrate when doing rules on cpu but this doesnt matter in an older thread i tried different attacks, combinator, dict + rules and bf with scrypt, result was always the same speed
to check your attack use --stdout before like this
pw.txt
and a rule.txt with just T0 inside (toogle first char)
this will result in output like this (shortened), these are your generated passwords, 3 elements (min,max) and with first char toggled
https://github.com/hashcat/princeprocessor
https://reusablesec.blogspot.com/2014/12...rince.html
rules dont "generate" passwords but modify them, next thing yes, you will gain no boost in hashrate when doing rules on cpu but this doesnt matter in an older thread i tried different attacks, combinator, dict + rules and bf with scrypt, result was always the same speed
to check your attack use --stdout before like this
pw.txt
Code:
a
b
c
1
2
3
Code:
pp64.exe --elem-cnt-min=3 --elem-cnt-max=3 < pw.txt | hashcat.exe --stdout -r rule.txt
Code:
Ca3
1a3
2a3
3a3
Ab3
Bb3
Cb3
1b3
2b3
3b3
Ac3
Bc3
Cc3
1c3
2c3
3c3
A13
B13