Mask Attack with a "blank" value?
#38
This type of attack makes no sense to me. You are basically just trying some combinations of the characters "0", "5", "7", "!" and "@" (together with --increment right?).
hashcat will generate password candidates without the constant string PASSWORD first (this depends on how large the --increment-min parameter is), after that it will include P, PA, PAS, PASS, PASSW, PASSWO, PASSWOR and finally PASSWORD *exactly* at position 11 and afterwards (if all those masks were already done, this could take very long), it will also append a varying couple of appended chars from the charset.

it basically does this:
1. test all combinations of the characters "0", "5", "7", "!" and "@" of length specified with --increment-min (PASSWORD is not yet involved, depending on the --increment-min value)
2. test all combinations of the characters "0", "5", "7", "!" and "@" of length specified with increment-min + 1 (again, PASSWORD might not be involved at all)
3. test all combinations of the characters "0", "5", "7", "!" and "@" of length specified with --increment-min + 2 (again, PASSWORD might not be involved at all)
...
x. test all combinations of the characters "0", "5", "7", "!" and "@" of length 10 and append the first character of "PASSWORD", i.e. append "P" (10 characters from charset + "P")
x+1. test all combinations of the characters "0", "5", "7", "!" and "@" of length 10 and append the first two character of "PASSWORD", i.e. append "PA" (10 characters from charset + "PA")
...
y. test all combinations of the characters "0", "5", "7", "!" and "@" of length 10, append "PASSWORD" and append 1 character from the charset (either "0", "5", "7", "!" or "@")
y+1. test all combinations of the characters "0", "5", "7", "!" and "@" of length 10, append "PASSWORD" and append 2 character from the charset (either "0", "5", "7", "!" or "@")
...


as you can see, this type of attack only would make sense if you know that:
1. "PASSWORD" might not be involved at all (depending on the --increment-min value)
2. the length of the prefix before "PASSWORD" is constant (always 10 characters before "PASSWORD"), only the length after "PASSWORD" varies

It's very unusual to generate password candidates like this. Normally you would want to always involve the fixed string (if there is any) and the expansion should normally be done (if you have a set of custom charset around - before and after - a constant string) on either site, i.e. normally you would do something like this with hashcat mask files:
Code:
PASSWORD?1
?1PASSWORD
?1PASSWORD?1

PASSWORD?1?1
?1?1PASSWORD
?1?1PASSWORD?1?1

?1PASSWORD?1?1
?1?1PASSWORD?1
...

with a strategy like this, we would always involve PASSWORD and expand the constant string on one or the other (or both) sides. In my opinion, this would make much more sense.
Of course, I'm not saying that mask attack should be used here... because it might be better to use a different attack types (dict + rules?).... but I'm just saying I'm still not convinced that your password generation looks correct (it seems weird to me that PASSWORD is not always involved and that the prefix is of fixed length... or you must be very sure about the length of the prefix if you run such an attack).


Messages In This Thread
Mask Attack with a "blank" value? - by solace - 01-08-2018, 10:42 PM
RE: Mask Attack with a "blank" value? - by solace - 01-09-2018, 04:56 PM
RE: Mask Attack with a "blank" value? - by solace - 01-10-2018, 04:27 PM
RE: Mask Attack with a "blank" value? - by solace - 01-15-2018, 06:42 PM
RE: Mask Attack with a "blank" value? - by solace - 01-15-2018, 06:46 PM
RE: Mask Attack with a "blank" value? - by solace - 01-15-2018, 08:35 PM
RE: Mask Attack with a "blank" value? - by solace - 01-15-2018, 09:49 PM
RE: Mask Attack with a "blank" value? - by solace - 01-15-2018, 10:03 PM
RE: Mask Attack with a "blank" value? - by solace - 01-15-2018, 10:34 PM
RE: Mask Attack with a "blank" value? - by solace - 01-16-2018, 04:54 AM
RE: Mask Attack with a "blank" value? - by solace - 01-17-2018, 05:58 PM
RE: Mask Attack with a "blank" value? - by solace - 01-25-2018, 06:38 AM
RE: Mask Attack with a "blank" value? - by solace - 01-26-2018, 09:51 PM
RE: Mask Attack with a "blank" value? - by solace - 01-26-2018, 10:19 PM
RE: Mask Attack with a "blank" value? - by solace - 01-27-2018, 02:52 AM
RE: Mask Attack with a "blank" value? - by solace - 01-27-2018, 03:58 AM
RE: Mask Attack with a "blank" value? - by solace - 01-27-2018, 04:56 AM
RE: Mask Attack with a "blank" value? - by solace - 01-27-2018, 06:00 PM
RE: Mask Attack with a "blank" value? - by solace - 01-28-2018, 03:59 AM
RE: Mask Attack with a "blank" value? - by solace - 01-28-2018, 10:09 PM
RE: Mask Attack with a "blank" value? - by solace - 01-29-2018, 04:41 AM
RE: Mask Attack with a "blank" value? - by solace - 02-06-2018, 05:07 PM
RE: Mask Attack with a "blank" value? - by solace - 02-07-2018, 03:42 AM
RE: Mask Attack with a "blank" value? - by philsmd - 02-07-2018, 09:48 AM