Hybrid attack
#4
You could use a hcmask file (see https://hashcat.net/wiki/doku.php?id=mas...mask_files):

file my.hcmask:
Code:
?l?u?d,key?1
?l?u?d,?1key
?l?u?d,key?1?1
?l?u?d,?1?1key
?l?u?d,?1key?1
?l?u?d,key?1?1?1
?l?u?d,?1?1?1key
?l?u?d,?1key?1?1
?l?u?d,?1?1key?1
?l?u?d,key?1?1?1?1
?l?u?d,?1?1?1?1key
?l?u?d,?1key?1?1?1
?l?u?d,?1?1key?1?!
?l?u?d,?1?1?1key?1

and run it like this:
Code:
hashcat -m 0 -a 3 -w 3 hashes.txt my.hcmask

the only disadvantage of this solution is that the speed is not guaranteed to be the best for all mask (especially if we have masks with a constant prefix). On the other hand, it is for sure the most convenient way to run a set of masks that follow certain policies.


Messages In This Thread
Hybrid attack - by pkneca - 10-04-2017, 11:16 AM
RE: Hybrid attack - by TofuBoy22 - 10-04-2017, 11:45 AM
RE: Hybrid attack - by pkneca - 10-04-2017, 01:18 PM
RE: Hybrid attack - by philsmd - 10-04-2017, 08:27 PM
RE: Hybrid attack - by pkneca - 10-07-2017, 01:07 AM