rules file support in attack mode 3
#5
(02-15-2018, 10:30 AM)philsmd Wrote: If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password candidates to a dictionary file and use the dictionary and the duplicate rule in hashcat.

e.g.
Code:
hashcat --stdout -a 3 ?d?d?d?d > dict.txt
(or use maskprocessor instead)

and
Code:
hashcat -m 0 -w 4 -r duplicate.rule hash.txt dict.txt
where the file duplicate.rule contains the duplicate rule (d)
For small keyspace,this can work.But I want to find a way that can support very large keyspace and the speed can be even as fast as the bruteforce attack since the dictionary attack still has too many limitations on disk space and speed .


Messages In This Thread
RE: rules file support in attack mode 3 - by atom - 02-13-2018, 10:39 AM
RE: rules file support in attack mode 3 - by hash_cat_fish - 02-24-2018, 06:51 AM