b8vr is right, i think princeprocessor is the best approach on this
open a texteditor and add your password chunks
like
and so on.
depending on your input count (if relativly low) you can use princeprocessor to generate a list which you can then use to feed hashcat
pp64 < pw-chunks.txt > password-list.txt
or, if your input count is relativly high you feed the output directly to hashcat like that (rules are optional)
pp64 < wordlist.dict | hashcat [options] target.hash -r prince_optimized.rule
be aware of prineprocessors default maxlength of 16 for generating passwordcandidates, see pp64 --help for relevant options
open a texteditor and add your password chunks
like
Code:
.
18
dog
d0g
catcher
matized
$1422
!1422
#1422
depending on your input count (if relativly low) you can use princeprocessor to generate a list which you can then use to feed hashcat
pp64 < pw-chunks.txt > password-list.txt
or, if your input count is relativly high you feed the output directly to hashcat like that (rules are optional)
pp64 < wordlist.dict | hashcat [options] target.hash -r prince_optimized.rule
be aware of prineprocessors default maxlength of 16 for generating passwordcandidates, see pp64 --help for relevant options