Cracking unusual format StaticWord-Reverse(Password)-StaticWord
#2
first if you intend to use bruteforce you didnt need the rule for reversing, because never the less bruteforce will generate both, password and reversed password, so there is no need for reversing

do you believe the passwords are randomly generated or do you think there are "mainstream pw"?

what about he static word? if you know it i would use prepend append rule for this, in your case

you can test this as following
testdic
Code:
12345
Password
rule
Code:
r $a$p$p$e$n$d ^p^r^e^p^e^n^d
hashcat
Code:
hashcat --stdout -r rule testdic

output
Code:
dneperp54321append

dneperpdrowssaPappend

as you can see, you have to reverse your prepend becaus the rules are read and worked left to right so to "read" prepend you have to use

rule
Code:
r $a$p$p$e$n$d ^d^n^e^p^e^r^p

you can modify this to get your fixed words, you can test with --stdout to see if it works like you intended

there is also the possiblity to use 3 wordlists and combine them to get the same behavior, but if you want to use a realword wordlist (without reversing them beforehand) i think the rule approach is better and maybe al little bit faster
Reply


Messages In This Thread
RE: Cracking unusual format StaticWord-Reverse(Password)-StaticWord - by Snoopy - 03-21-2022, 05:34 PM