Mask + Brute Force with repeated password
#2
What hash mode are you attacking? If it's a slow one the easiest way would be to have a rule double the word and append + prepend the known part. If you want to combine that with a mask attack you can use maskprocessor or hashcat's stdout to pipe in your words.


Messages In This Thread
RE: Mask + Brute Force with repeated password - by undeath - 02-22-2018, 10:36 AM