03-23-2023, 04:10 PM
(03-23-2023, 10:03 AM)chicken Wrote: Hi.
I'm trying to crack MD5 hash made from repeated password.
P@ssw0rd become P@ssw0rdP@ssw0rd before It's hashed for example.
I tried like this
hashcat -a 3 -0 -r duplicate.rule -i '?a?a?a?a?a?a?a?a' hashfile
but it said -r option only supports -a 0.
so I tried stdin mode to use -r option but it was veeerrry slow.
Any good solution about that?
you are mixing up 2 different attack types -a3 is bruteforce so its basically testing every combination of every char in your charset, for rules you need -a0 and a dictionary file, a dictionary is a list of passwordcanditates
lets assume file dictionary.txt contains
1
2
3
a
b
c
with a rulefile containing two lines
:
p1
for description opf the rules see https://hashcat.net/wiki/doku.php?id=rule_based_attack
you will get the basic dictionary content and
11
22
33
aa
bb
cc
but you will need a dictionary file for that, you could start with these lists https://hashmob.net/resources/hashmob