Rule for omitting duplicates in bruteforce attack?
#1
Hi, I'm trying to crack a handshake using a bruteforce attack....I know the password has 12 characters uppercase+numbers, which is a lot of permutations, but I also know that all the characters in the password are unique, so I don't want hashcat wasting it's energy going through passwords with duplicate chars. Is there a rule or function I can use? I didn't find any in the wiki

Here's my code so far...
hashcat64.exe -m 2500 -a 3 capture.hccapx -1 ?u?d  ?1?1?1?1?1?1?1?1?1?1?1?1

I appreciate any help!


Messages In This Thread
Rule for omitting duplicates in bruteforce attack? - by veggiebiker2500 - 04-22-2018, 07:28 PM