Bruteforce + rules
#3
phahRoe1, thanks for your answer, but...

I know how to use mask attacks, bruteforce attacks, dictionary attack, and rules. And I have read these links too.

In fact, it works. But it is very very very slow (as I said in the fifth paragraph in the last message):

Code:
$ mp64.bin ?a?a?a?a?a?a?a?a | hashcat -m0 -O -r rules.file hash.file

But the question, if you have read the message and the example, is how to use bruteforce attacks (with masks) and rules all together to duplicate the word in order to make an attack of the half of lenght (the previous example uses a 8-chars mask instead 16-chars) when you know you are cracking that kind of passwords.

Because if you try it:
Code:
$ hashcat -m0 -a3 -O -r rules.file hash.file ?a?a?a?a?a?a?a?a

... you get this:
Use of -r/--rules-file and -g/--rules-generate only allowed in attack mode 0.


Messages In This Thread
Bruteforce + rules - by asirena - 11-22-2017, 03:22 AM
RE: Bruteforce + rules - by phahRoe1 - 11-22-2017, 04:21 AM
RE: Bruteforce + rules - by asirena - 11-22-2017, 04:35 AM
RE: Bruteforce + rules - by royce - 11-22-2017, 04:50 AM
RE: Bruteforce + rules - by asirena - 11-22-2017, 05:02 AM
RE: Bruteforce + rules - by royce - 11-22-2017, 05:32 AM
RE: Bruteforce + rules - by royce - 11-22-2017, 06:20 AM
RE: Bruteforce + rules - by asirena - 11-22-2017, 02:42 PM
RE: Bruteforce + rules - by royce - 11-22-2017, 05:43 PM
RE: Bruteforce + rules - by epixoip - 11-22-2017, 08:06 PM
RE: Bruteforce + rules - by asirena - 11-22-2017, 08:10 PM
RE: Bruteforce + rules - by royce - 11-22-2017, 08:33 PM
RE: Bruteforce + rules - by asirena - 11-23-2017, 03:45 AM
RE: Bruteforce + rules - by royce - 11-23-2017, 06:18 AM
RE: Bruteforce + rules - by asirena - 11-24-2017, 09:56 PM