The time for my WPA2 Password cracking increased a lot after secifying chrset
#6
put these into a file called list.list

test
word
admin
root
superdupapass

and run 
hashcat --stdout -a 6 list.list ?d

as you can see hahscat prints all of the above candidates with one digit [0-9] APPENDED
run hashcat --stdout -a 7 ?d list.list for PREPENDED

you can use redirection >> to output this into another file

so running these 2
hashcat --stdout -a 6 list.list ?d >> list2.list
hashcat --stdout -a 7 ?d list.list >> list2.list

will give you a list2.list with all pws from list.list appended and prepended with a single number from [0-9]

so all you have to do is prepare your list.list and upgrade/update this simple mask ?d with a more suitable for your case
 
be aware, depending an your list and mask (if you use something like increment and or a long mask) u will need plenty of storage for your generated list)

OR you can feed hahscat directly with these generated pw candidates but then you have to do multiple runs due to the fact that your attackvektor is quite special and generating all rules to achieve appending and prepending in one run will also take some time

to achieve more complex things like you mentioned with 2 words you can use hahscat utils combinator

.\combinator.exe .\list.list .\list.list

will output all words from list.list combined with eachother so
testtest
testword
... and so on
Reply


Messages In This Thread
RE: The time for my WPA2 Password cracking increased a lot after secifying chrset - by Snoopy - 04-28-2021, 04:02 PM