What rules for this possible password ?
#6
This is how I would do it.. I used this method to recover my bitcoin wallet , I knew parts of the passwords that I used but couldn't remember in what order and a few other things..



grab yourself Prince Processor: https://github.com/hashcat/princeprocessor



We are going to use Prince to generate all our combinations and feed them into Hashcat..



This is my example that worked..



pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0  -m 11300 -w 4  -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 "C:\temp\YOUR-Hash-File.txt"



wordlist.txt ( all of parts of the password, include cas sensitve ones as well, or even parts of it)

orange

Orange

Apple

apple

Pear

pear

_

_

31444

45333



--elem-cnt-min=4 --elem-cnt-max=8

min=4 means it will combine 4 of those words to produce a result and max of 8 combinations..

OrangeApple_31444 ( 4 combos)

OrangeOrangeOrangeAppleAppple ( 5 combos)



it will try every permutation, the smaller the list and the lower the MAX value the quicker it will run through every combinations. If it gets too large then it will take forever and a day..



You can also combine RULES, Case or UPPER all words, toggles , duplicate, reverse, insert specific characters, what ever you want..

eg:

pp64.exe --elem-cnt-min=2 --elem-cnt-max=8 --pw-min=8 --pw-max=18 < wordlist.txt | hashcat.exe -a 0  -m 11300 -w 4  -O --status --status-timer=5 -o "c:\temp\FOUNDPASSWORD.txt" --outfile-format=3 -r "c:\temp\customRULES.rule" C:\temp\YOUR-Hash-File.txt"



depending on your OS you might not need to use the " ".. I'm on Windoze
Reply


Messages In This Thread
RE: What rules for this possible password ? - by IamYourLeader - 10-08-2022, 12:04 PM