Mask Attack
#2
this is a common question when it comes to masks

the problem is, any built-in logic (there is noone) to skip such inputs would reduce the overall performance dramatically due to the fact how hahscat generates its password canditates

the only way to achieve what you want is to provide a maskfile with every possible mask-combination like that

maskfile.txt
3456789,ABCDEFGHJKMNPQRTUVWXY,?1?1?2?2?2?2?2?2
3456789,ABCDEFGHJKMNPQRTUVWXY,?1?2?1?2?2?2?2?2

to help you, you can utilize maskprocessor see https://hashcat.net/wiki/doku.php?id=maskprocessor and invoke it like that

Code:
mp64 -1 12 ???1???1???1???1???1???1???1???1 > maskfile.txt

BEWARE: this will generate ALL combinations, you need to clean the file from the unwanted ones (there are only 9, so its not that hard)

and then you need to copy 3456789,ABCDEFGHJKMNPQRTUVWXY, to the front of each line (use an editor like sublimetext for that)

then run hashcat with the maskfile instead of your mask
Reply


Messages In This Thread
Mask Attack - by Idle_Wild - 03-04-2024, 01:50 PM
RE: Mask Attack - by Snoopy - 03-05-2024, 04:52 PM
RE: Mask Attack - by Idle_Wild - 03-06-2024, 12:46 AM
RE: Mask Attack - by Idle_Wild - 03-06-2024, 01:19 AM
RE: Mask Attack - by Idle_Wild - 03-06-2024, 01:58 AM