Mask + Brute Force with repeated password
#9
How do you know that it doesn't duplicate whenever the length is greater than 15? How did you test it?

if I run something like this:
Code:
echo abcdefghijklmnopqrstuvwxyz | hashcat --stdout -r duplicate.rule

the output is as expected.

You might only think that it never duplicate long enough words because hashcat didn't reach these words yet. Your attack could take very long until it reaches words that are that long etc.

It also doesn't make much sense to use 2 pipes in your specific situation, you could just run this:
Code:
hashcat --stdout --increment -a 6 -1 ?l?u?d?s wordlist.txt ?1?1?1?1 | hashcat -m 14600 -r duplicate.rule -r footer.rule file.img

or even chage footer.rule to already include the duplicate rule and therefore run:
Code:
hashcat --stdout --increment -a 6 -1 ?l?u?d?s wordlist.txt ?1?1?1?1 | hashcat -m 14600 -r footer_with_duplicate.rule file.img

where footer_with_duplicate.rule also contains the d-rule in each and every line.

Again, to test/troubleshoot this I would suggest to test with a few words (maybe even make tests without the increment option) and see what the output of --stdout looks like etc.
There is no such limit that it couldn't be longer than 15.


Messages In This Thread
RE: Mask + Brute Force with repeated password - by philsmd - 03-02-2018, 10:14 AM