Hashcat bruteforcing with special rules
#1
Hello,

I am a hashcat noob but I need some help. I forgot my Truecrypt Countainer Password and need to crack it now.
It has 37-41 Characters. The good news I know the last 20 Characters and the first 4 excatly. I know the 6th Position it's a "," or ".". And I know the 5th Position could be one letter or nothing, than the 6th Position would be the 6th Position.
I also know between 5/6 till 20/21th Position are two static phrases.
One is like that "HuW" and one is like that "84839", the rest is out of 6 Characters.

Example how it could look like:

!Ii!,HuW;,.H).84839..123456789+'+uHdbHDhE

or maybe:

!Ii!c.HuW;,HH).84839..123456789+'+uHdbHDhE

(don't worry I changed up here things, thats now how my password look like, but it's an example for configuration.)

I did some math and cam out that it can get cracked in less than a day with a Amd 290x.

I need now help to get the configuration right. Here is an example how it would look like in OTFBrutus.

!Ii![c]{0-1}[\.\,]{1}["HuW" \;\.\-\_\)\: "84839"]{6-10}123456789+'+uHdbHDhE
OTFBrutus said it would be 4908384256 combinations.
(4908384256 / 500000 / 60 / 60 = 2,72 h)


the password can only get cracked in a good time, if 84839 and HuW are threated like a static phrases "in way like a character (from the math side").

Thank you very much!


Messages In This Thread
Hashcat bruteforcing with special rules - by MultiFilm - 04-01-2015, 11:35 AM