Understanding hybrid_attack
#2
Hashcat/Oclhc does not have pre-processing, but that doesn't mean you can't do what you want with the mutation engine.
Use maskprocessor to generate the rules:
Code:
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?1^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?2^?1^?2^?2^?2^?2^?2 -o rules.txt
...
Then just use those rules with the wordlist
This is one way of doing it.


Messages In This Thread
Understanding hybrid_attack - by babele - 08-04-2013, 01:29 PM
RE: Understanding hybrid_attack - by Rolf - 08-04-2013, 02:13 PM