A mask to match IPv4 maybe?
#1
What is the proper way of brute-forcing hashes using all ipv4 addresses as plain-text passwords?

With oclHashcat it can be easily done using a combination mode and two dictionaries, you can read about it here
https://www.phillips321.co.uk/2012/04/04...p-address/

But combination mode for cpu hashcat is different, it takes only one dictionary and attacks with combinations of words in that dictionary.

A dictionary of all ip addresses is going to eat a real lot of disk space, so it is not a good solution. 

Another approach is to use many masks to match various ip formats, like this
?d.?d.?d.?d -> x.x.x.x
...
1?d?d.?d?d.?d?d?d.?d -> 1xx.xx.xxx.x
...
...
?d.?d?d?d.?d?d?d.?d -> x.xxx.xxx.x
...
and so on. 

However, such masks may also match invalid IPs, and it will take many sessions to check all masks. 

So I wonder if there is a more elegant solution.


Messages In This Thread
A mask to match IPv4 maybe? - by kekerao - 10-24-2015, 11:16 PM
RE: A mask to match IPv4 maybe? - by NullMode - 10-24-2015, 11:24 PM
RE: A mask to match IPv4 maybe? - by kekerao - 10-24-2015, 11:35 PM
RE: A mask to match IPv4 maybe? - by undeath - 10-25-2015, 02:53 AM
RE: A mask to match IPv4 maybe? - by atom - 10-25-2015, 09:08 PM
RE: A mask to match IPv4 maybe? - by undeath - 10-25-2015, 10:13 PM
RE: A mask to match IPv4 maybe? - by kekerao - 10-25-2015, 11:58 PM