Rejection of passwords with a length of 8 or more characters using rules.
#4
I guess you mean hash mode 22000 which has a default minimum length of 8.
hashcat option -S will do the trick:
Code:
$ hashcat -m 22000 test.22000 -S -r test.rule wordlist

wordlist:
jojmy

test.rule:
$1 $9 $8 $0

Session..........: hashcat                                
Status...........: Exhausted
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: test.22000
Time.Started.....: Sat Apr  1 07:20:27 2023 (2 secs)
Time.Estimated...: Sat Apr  1 07:20:29 2023 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (wordlist)
Guess.Mod........: Rules (test.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:       70 H/s (0.30ms) @ Accel:8 Loops:128 Thr:256 Vec:1
Recovered........: 0/591 (0.00%) Digests (total), 0/591 (0.00%) Digests (new), 0/115 (0.00%) Salts
Progress.........: 115/115 (100.00%)
Rejected.........: 0/115 (0.00%)
Restore.Point....: 1/1 (100.00%)
Restore.Sub.#1...: Salt:114 Amplifier:0-1 Iteration:4-9
Candidate.Engine.: Host Generator + PCIe
Candidates.#1....: johny1980 -> johny1980
Hardware.Mon.#1..: Temp: 43c Util: 70% Core:1980MHz Mem:3500MHz Bus:8

Started: Sat Apr  1 07:20:26 2023
Stopped: Sat Apr  1 07:20:31 2023
Nothing will be rejected.
Reply


Messages In This Thread
RE: Rejection of passwords with a length of 8 or more characters using rules. - by ZerBea - 04-01-2023, 07:25 AM