10-08-2022, 12:04 PM
(This post was last modified: 10-08-2022, 12:15 PM by IamYourLeader.
Edit Reason: formatting again plus Bold annd spelling
)
This is how I would do it.. I used this method to recover my bitcoin wallet , I knew parts of the passwords that I used but couldn't remember in what order and a few other things..
grab yourself Prince Processor: https://github.com/hashcat/princeprocessor
We are going to use Prince to generate all our combinations and feed them into Hashcat..
This is my example that worked..
pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0 -m 11300 -w 4 -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 "C:\temp\YOUR-Hash-File.txt"
wordlist.txt ( all of parts of the password, include cas sensitve ones as well, or even parts of it)
orange
Orange
Apple
apple
Pear
pear
_
_
31444
45333
--elem-cnt-min=4 --elem-cnt-max=8
min=4 means it will combine 4 of those words to produce a result and max of 8 combinations..
OrangeApple_31444 ( 4 combos)
OrangeOrangeOrangeAppleAppple ( 5 combos)
it will try every permutation, the smaller the list and the lower the MAX value the quicker it will run through every combinations. If it gets too large then it will take forever and a day..
You can also combine RULES, Case or UPPER all words, toggles , duplicate, reverse, insert specific characters, what ever you want..
eg:
pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0 -m 11300 -w 4 -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 -r "c:\temp\customRULES.rule" C:\temp\YOUR-Hash-File.txt"
depending on your OS you might not need to use the " ".. I'm on Windoze
grab yourself Prince Processor: https://github.com/hashcat/princeprocessor
We are going to use Prince to generate all our combinations and feed them into Hashcat..
This is my example that worked..
pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0 -m 11300 -w 4 -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 "C:\temp\YOUR-Hash-File.txt"
wordlist.txt ( all of parts of the password, include cas sensitve ones as well, or even parts of it)
orange
Orange
Apple
apple
Pear
pear
_
_
31444
45333
--elem-cnt-min=4 --elem-cnt-max=8
min=4 means it will combine 4 of those words to produce a result and max of 8 combinations..
OrangeApple_31444 ( 4 combos)
OrangeOrangeOrangeAppleAppple ( 5 combos)
it will try every permutation, the smaller the list and the lower the MAX value the quicker it will run through every combinations. If it gets too large then it will take forever and a day..
You can also combine RULES, Case or UPPER all words, toggles , duplicate, reverse, insert specific characters, what ever you want..
eg:
pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0 -m 11300 -w 4 -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 -r "c:\temp\customRULES.rule" C:\temp\YOUR-Hash-File.txt"
depending on your OS you might not need to use the " ".. I'm on Windoze